{"id":6551,"date":"2025-05-09T13:59:20","date_gmt":"2025-05-09T13:59:20","guid":{"rendered":"https:\/\/gitprotect.io\/blog\/?p=6551"},"modified":"2025-11-20T14:47:23","modified_gmt":"2025-11-20T14:47:23","slug":"the-most-common-cybersecurity-mistakes-made-by-jira-admins","status":"publish","type":"post","link":"https:\/\/gitprotect.io\/blog\/the-most-common-cybersecurity-mistakes-made-by-jira-admins\/","title":{"rendered":"The Most Common Cybersecurity Mistakes Made by Jira Admins"},"content":{"rendered":"\n<p><strong>Let&#8217;s imagine you&#8217;ve inherited a Jira instance. It&#8217;s been running for years. Nobody remembers or knows who set it up. The documentation is a PDF, which was last updated in 2017. Now, you&#8217;ve got 600 users, 47 custom workflows, three broken automations, and a SAML integration duct-taped to a legacy IDP. Welcome to the jungle. And here comes the security audit\u2026<\/strong><\/p>\n\n\n\n<!--more-->\n\n\n\n<p>It&#8217;s hard to assume that most Jira admins are careless. They&#8217;re often overwhelmed. Jira isn&#8217;t just a project tracker. It&#8217;s not rare when, after some time, it becomes a labyrinth of configuration panels, permission schemes, and hidden behaviors that Atlassian sometimes changes &#8211; without notice.<\/p>\n\n\n\n<p>It&#8217;s no surprise that Jira in such a shape is also an easier <a href=\"https:\/\/gitprotect.io\/blog\/protecting-software-data-securing-ways-to-export-work-items-from-jira\/\" target=\"_blank\" rel=\"noreferrer noopener\">target for potential attackers<\/a>. If so, all it takes is one simple mistake to a disaster, whether it&#8217;s due to handing out access to production logs, security incidents, or IP documentation.<\/p>\n\n\n\n<p>Let&#8217;s check the most common mistakes that can burn Jira and the admin.<\/p>\n\n\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Mistake 1. Overexposed permission schemes<\/strong><\/h2>\n\n\n\n<p>It won\u2019t be a mistake to state that many organizations treat permissions like plumbing, following the thought: \u201cIf the water flows, we\u2019re good.\u201d Nonetheless, Jira permissions are recursive, conditional, and silent. And that\u2019s a problem.<\/p>\n\n\n\n<p>Take a quick look at the test below;<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>curl -u admin:password https:\/\/your.jira.domain\/rest\/api\/2\/project<\/code><\/pre>\n\n\n\n<p>If a user with no business in R&amp;D views the internal project list, you\u2019ve got a leak. It\u2019s usually due to <strong><em>Browse Projects<\/em><\/strong> granted through an <strong><em>Anyone<\/em><\/strong> or<strong> <\/strong><strong><em>jira-users<\/em><\/strong> group. Combining that with <strong><em>Manage Sprints<\/em><\/strong> or Edit Issues allows attackers to tamper with workflows unnoticed, which is even worse.<\/p>\n\n\n\n<p>Permission audits are challenging because Jira doesn\u2019t expose effective permissions natively. That means you\u2019ll need either <strong>Assets<\/strong> (Insight) or scripts \u2013 like the one below \u2013 with ScriptRunner (groovy):<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>import com.atlassian.jira.component.ComponentAccessor\ndef projectManager = ComponentAccessor.getProjectManager()\ndef permissionManager = ComponentAccessor.getPermissionManager()\ndef user = ComponentAccessor.getUserManager().getUserByName(\"username\")\n\nprojectManager.getProjectObjects().each { project -&gt;\n\tdef hasPermission = permissionManager.hasPermission(Permissions.BROWSE, project, user)\n\tif (hasPermission) {\n    \tlog.warn(\"User has access to: ${project.getName()}\")\n\t}\n}<\/code><\/pre>\n\n\n\n<p>It may be surprising how many ghost accounts still have access to decommissioned projects.<\/p>\n\n\n\n<p>Another interesting case is <strong>over-permissioned project roles<\/strong>. This is the part where the possibility of internal sabotage grows. This may be an exaggeration, but it is worth remembering that Jira makes it easier &#8211; or even more convenient &#8211; to give project-specific admin rights.<\/p>\n\n\n\n<p>For example, when a given admin wants to let Team Leads manage sprints, a custom role is created by slapping on <strong><em>Administer Projects<\/em><\/strong>. And that\u2019s it!&nbsp;<\/p>\n\n\n\n<p>In the meantime, that permission allows Team Leads to change workflows, edit screens, add fields, and inject scripts if Forge is enabled. One malicious custom field with an automation can:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>exfiltrate data<\/li>\n\n\n\n<li>trigger CI\/CD builds<\/li>\n\n\n\n<li>flood Slack with unwanted data.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Mistake 2. Anonymous access enablement<\/strong><\/h2>\n\n\n\n<p>Even though it seems impossible, such mistakes still happen. In some companies, it\u2019s a quick fix for contractors or a leftover from public service desks or internal wikis. The challenge is that anonymous access applies to issues, attachments, and workflows. That\u2019s an open door.<\/p>\n\n\n\n<p>Take a quick test and run:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>curl -s https:\/\/your.jira.domain\/rest\/api\/2\/issue\/KEY-1234 | jq<\/code><\/pre>\n\n\n\n<p>If you get a 200 without an auth header, you have a problem. The fix doesn\u2019t just turn off anonymous in <strong><em>Global Permissions<\/em><\/strong>. It&#8217;s also necessary to verify each project\u2019s permission scheme. Ensure <strong><em>Browse Projects<\/em><\/strong> doesn\u2019t include the <strong><em>Anyone<\/em><\/strong> group. Reason? Some setups bypass global restrictions entirely.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>Jira Administration \u2192 System \u2192 Global Permissions \u2192 Browse Projects<\/code><\/pre>\n\n\n\n<p>In a situation where <em>Anyone<\/em> has permission, the whole tracking system becomes a public blog for obvious reasons. Then, all it takes is an unauthenticated curl to start scraping:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>curl https:\/\/yourdomain.atlassian.net\/rest\/api\/2\/search?jql=project=DEV<\/code><\/pre>\n\n\n\n<p>From the API perspective, it doesn\u2019t matter whether someone is logged or not. It has been instructed to omit that aspect.<\/p>\n\n\n\n<p>Exposed Jira instances have the potential to leak hundreds of issues this way. That includes attachments and comments, not to mention AWS keys, JWT tokens in logs, etc. All get indexed by Google unless blocked in the <strong>robots.txt<\/strong> file.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Mistake 3. Reusing local admin accounts<\/strong><\/h2>\n\n\n\n<p>It may be hard to believe, but many Jira admins still create service accounts using names like <strong>jira_admin<\/strong>, <strong>deployment<\/strong>, or <strong>svc-jenkins<\/strong>. These are often local and not tied to LDAP, SSO, or any other (and meaningful) identity provider.<\/p>\n\n\n\n<p>And yes, in such configurations, admins tend to use shared passwords with no expiration, rotation, or audit trail.<\/p>\n\n\n\n<p>A fine example may be a situation when the attacker uses a <strong>build_agent<\/strong> account. He utilizes it to escalate to Confluence, take over VPN configs, and pivot into AWS. During the process, it turns out that the password is a few years old, and nobody has used the account since Jenkins was migrated.<\/p>\n\n\n\n<p>In the meantime, tying every account to a person or service principal via SSO is a standard. The same goes for setting up SCIM provisioning and using OAuth 2.0 (if possible). In other words, it\u2019s impossible to improve anything if you don\u2019t track it.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Mistake 4. Misconfigured webhooks<\/strong><\/h2>\n\n\n\n<p>Webhooks, automation, and CI\/CD triggers stay in the DevOps interest. However, each webhook is an outbound HTTP request to a configured URL. They often entail authentication headers or sensitive payloads.<\/p>\n\n\n\n<p>Nonetheless, there are cases where Jira admins forget these requests are plaintext over HTTP &#8211; if you don\u2019t force HTTPS. It\u2019s even worse, as they point to public IPs in test environments with debug logging enabled.&nbsp;<\/p>\n\n\n\n<p>For instance, let\u2019s look at the webhook config below (JSON):<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>{\n  \"url\": \"http:\/\/test-ci.example.com:8080\/hook\",\n  \"events\": &#091;\"jira:issue_created\"],\n  \"excludeBody\": false\n}<\/code><\/pre>\n\n\n\n<p>The URL leaks issue descriptions to a public endpoint. The latter can be easily exposed and scanned. This way, attackers know where issues come from and who owns them. In other words, encryption with signed tokens in webhook headers and payload monitoring are musts.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Mistake 5. Failing to back up (correctly)<\/strong><\/h2>\n\n\n\n<p>Neglecting to properly back up Jira data is a serious oversight. Administrators responsible for such critical systems must treat data protection as a top priority, as failure to do so can have severe consequences for the organization.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2025\/05\/stats.png\" alt=\"Backup statistics\" class=\"wp-image-6557\" style=\"width:500px;height:auto\" srcset=\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2025\/05\/stats.png 1024w, https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2025\/05\/stats-300x300.png 300w, https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2025\/05\/stats-150x150.png 150w, https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2025\/05\/stats-768x768.png 768w, https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2025\/05\/stats-180x180.png 180w, https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2025\/05\/stats-400x400.png 400w, https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2025\/05\/stats-600x600.png 600w, https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2025\/05\/stats-800x800.png 800w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n<p>Some still believe that backups are for <a href=\"https:\/\/gitprotect.io\/blog\/jira-restore-and-disaster-recovery-scenarios-use-cases-to-build-your-dr-strategy\/\" target=\"_blank\" rel=\"noreferrer noopener\">disaster recovery<\/a>. You can still find admins who perform backups haphazardly and on the run. Based on that, you state the obvious: poorly prepared backups are low-hanging fruit to take. Especially if they\u2019re:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>unencrypted<\/li>\n\n\n\n<li>accessible from the same network as your production instance (mind-blowing)<\/li>\n\n\n\n<li>stored with default names like jira_backup.zip.<\/li>\n<\/ul>\n\n\n\n<p>The above may seem absurd, yet it\u2019s widely known that 80% of <a href=\"https:\/\/gitprotect.io\/use-cases\/ransomware.html\" target=\"_blank\" rel=\"noreferrer noopener\">ransomware<\/a> incidents in enterprise settings target unprotected backup locations first. It\u2019s a natural move, but it doesn\u2019t happen without a reason.<\/p>\n\n\n\n<p>Above all, such locations are usually script-accessible when <a href=\"https:\/\/gitprotect.io\/blog\/gitprotect-jira-backup-vs-atlassians-built-in-backup-abilities\/\" target=\"_blank\" rel=\"noreferrer noopener\">Jira admins schedule backups<\/a> via REST or cron and dump them to shared volumes. For instance, take a bash below:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>smbclient \\\\\\\\10.1.1.50\\\\backups -U guest\nsmb: \\&gt; dir\n  jira_backup_2025_05_12.zip<\/code><\/pre>\n\n\n\n<p>This is a pure attack surface with an invitation. Of course, if your backup includes attachments, you practically handed over all files ever uploaded to a ticket. The conclusion here is simple. Jira backups must be encrypted and offloaded to separate networks. Restores should be validated monthly.<\/p>\n\n\n\n<p>A far better and more secure solution is using dedicated software, like GitProtect.io, that is not limited to a sheer backup and restore mechanism. Covering every aspect of your Jira setup \u2013 including Jira Software and Jira Service Management, with Jira Assets and Jira Automation Rules \u2013 this backup and disaster recovery platform integrates seamlessly. During the <a href=\"https:\/\/gitprotect.io\/blog\/s3-storage-for-devops-backups\/\" target=\"_blank\" rel=\"noreferrer noopener\">backup process<\/a>, the tool includes:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img decoding=\"async\" width=\"1024\" height=\"501\" src=\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2025\/05\/screen_3-1024x501-1.png\" alt=\"GitProtect backup for Jira\" class=\"wp-image-6559\" style=\"width:500px;height:auto\" srcset=\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2025\/05\/screen_3-1024x501-1.png 1024w, https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2025\/05\/screen_3-1024x501-1-300x147.png 300w, https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2025\/05\/screen_3-1024x501-1-768x376.png 768w, https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2025\/05\/screen_3-1024x501-1-400x196.png 400w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n<p>The described solution supports<a href=\"https:\/\/xopero.com\/blog\/en\/the-evolution-of-data-backup-is-the-3-2-1-backup-rule-a-thing-of-the-past\/\" target=\"_blank\" rel=\"noreferrer noopener\"> 3-2-1<\/a>, 3-2-1-1-0, 4-3-2 (and other) backup rules. It also provides GitProtect Cloud Storage for free, regardless of the license.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>The last word<\/strong><\/h2>\n\n\n\n<p>All elements described above underline the simple fact that Jira resembles your company&#8217;s nervous system. That makes it a magnet for (cyber)threat actors. It may seem like a paranoid or even hapless reality, but the key here is precision. Why? Because any setting you missed or didn\u2019t understand is a potential breach vector.<\/p>\n\n\n\n<p>And every time the admin says, \u201cIt\u2019s just Jira,\u201d t reminds about an a human error of 2022 when Atlassian experienced the worst outage with over 700 Jira users not being able to access their data for more than a fortnight. A thousand companies were affected and faced potential losses because \u201csomeone trusted the wrong default.\u201d<\/p>\n\n\n\n<p>From the Jira admin perspective, there\u2019s no such thing as \u201cjust\u201d Jira, only Jira done right. Of course, there\u2019s also incident response.<\/p>\n\n\n\n<p>Which side are you on?<\/p>\n\n\n\n<p class=\"has-background\" style=\"background-color:#f4fafe\"><a href=\"https:\/\/gitprotect.io\/sign-up.html\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>[FREE TRIAL] Ensure compliant DevOps backup and recovery with a 14-day trial<\/strong><\/a><strong> \ud83d\ude80<\/strong><br><br><a href=\"https:\/\/calendly.com\/d\/3s9-n9z-pgc\/gitprotect-live-demo?\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>[CUSTOM DEMO] Let\u2019s talk about how backup &amp; DR software for Jira can help you mitigate the risks<\/strong><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Let&#8217;s imagine you&#8217;ve inherited a Jira instance. It&#8217;s been running for years. Nobody remembers or knows who set it up. The documentation is a PDF, which was last updated in 2017. Now, you&#8217;ve got 600 users, 47 custom workflows, three broken automations, and a SAML integration duct-taped to a legacy IDP. Welcome to the jungle. And here comes the security audit\u2026<\/p>\n","protected":false},"author":16,"featured_media":6553,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2,73],"tags":[],"class_list":["post-6551","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-git-backup-101","category-jira","post--single"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Most Common Cybersecurity Mistakes Made by Jira Admins - Blog | GitProtect.io<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/gitprotect.io\/blog\/the-most-common-cybersecurity-mistakes-made-by-jira-admins\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Most Common Cybersecurity Mistakes Made by Jira Admins - Blog | GitProtect.io\" \/>\n<meta property=\"og:description\" content=\"Let&#8217;s imagine you&#8217;ve inherited a Jira instance. It&#8217;s been running for years. Nobody remembers or knows who set it up. The documentation is a PDF, which was last updated in 2017. Now, you&#8217;ve got 600 users, 47 custom workflows, three broken automations, and a SAML integration duct-taped to a legacy IDP. Welcome to the jungle. And here comes the security audit\u2026\" \/>\n<meta property=\"og:url\" content=\"https:\/\/gitprotect.io\/blog\/the-most-common-cybersecurity-mistakes-made-by-jira-admins\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog | GitProtect.io\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XoperoSoftware\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-09T13:59:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-20T14:47:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2025\/05\/2x_Human-Error_-The-most-common-cybersecurity-mistakes-of-Jira-Admins.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2400\" \/>\n\t<meta property=\"og:image:height\" content=\"1200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Wojciech Andryszek, Technical Content Writer at GitProtect.io\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@GitProtectio\" \/>\n<meta name=\"twitter:site\" content=\"@GitProtectio\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Wojciech Andryszek, Technical Content Writer at GitProtect.io\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/gitprotect.io\/blog\/the-most-common-cybersecurity-mistakes-made-by-jira-admins\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/the-most-common-cybersecurity-mistakes-made-by-jira-admins\/\"},\"author\":{\"name\":\"Wojciech Andryszek, Technical Content Writer at GitProtect.io\",\"@id\":\"https:\/\/gitprotect.io\/blog\/#\/schema\/person\/967901c0176390b9c3fa15c5da47f37b\"},\"headline\":\"The Most Common Cybersecurity Mistakes Made by Jira Admins\",\"datePublished\":\"2025-05-09T13:59:20+00:00\",\"dateModified\":\"2025-11-20T14:47:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/the-most-common-cybersecurity-mistakes-made-by-jira-admins\/\"},\"wordCount\":1388,\"publisher\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/the-most-common-cybersecurity-mistakes-made-by-jira-admins\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2025\/05\/2x_Human-Error_-The-most-common-cybersecurity-mistakes-of-Jira-Admins.jpg\",\"articleSection\":[\"Git Backup 101\",\"Jira\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/gitprotect.io\/blog\/the-most-common-cybersecurity-mistakes-made-by-jira-admins\/\",\"url\":\"https:\/\/gitprotect.io\/blog\/the-most-common-cybersecurity-mistakes-made-by-jira-admins\/\",\"name\":\"The Most Common Cybersecurity Mistakes Made by Jira Admins - Blog | GitProtect.io\",\"isPartOf\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/the-most-common-cybersecurity-mistakes-made-by-jira-admins\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/the-most-common-cybersecurity-mistakes-made-by-jira-admins\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2025\/05\/2x_Human-Error_-The-most-common-cybersecurity-mistakes-of-Jira-Admins.jpg\",\"datePublished\":\"2025-05-09T13:59:20+00:00\",\"dateModified\":\"2025-11-20T14:47:23+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/the-most-common-cybersecurity-mistakes-made-by-jira-admins\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/gitprotect.io\/blog\/the-most-common-cybersecurity-mistakes-made-by-jira-admins\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/gitprotect.io\/blog\/the-most-common-cybersecurity-mistakes-made-by-jira-admins\/#primaryimage\",\"url\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2025\/05\/2x_Human-Error_-The-most-common-cybersecurity-mistakes-of-Jira-Admins.jpg\",\"contentUrl\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2025\/05\/2x_Human-Error_-The-most-common-cybersecurity-mistakes-of-Jira-Admins.jpg\",\"width\":2400,\"height\":1200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/gitprotect.io\/blog\/the-most-common-cybersecurity-mistakes-made-by-jira-admins\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\/\/gitprotect.io\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Most Common Cybersecurity Mistakes Made by Jira Admins\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/gitprotect.io\/blog\/#website\",\"url\":\"https:\/\/gitprotect.io\/blog\/\",\"name\":\"GitProtect.io Blog\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/gitprotect.io\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/gitprotect.io\/blog\/#organization\",\"name\":\"GitProtect.io\",\"url\":\"https:\/\/gitprotect.io\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/gitprotect.io\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/05\/favicon-528x528-1.png\",\"contentUrl\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/05\/favicon-528x528-1.png\",\"width\":528,\"height\":528,\"caption\":\"GitProtect.io\"},\"image\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/XoperoSoftware\/\",\"https:\/\/x.com\/GitProtectio\",\"https:\/\/www.linkedin.com\/company\/xopero-software\/\",\"https:\/\/www.youtube.com\/channel\/UCiEnl6n0mIO6w7twccz-l2w\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/gitprotect.io\/blog\/#\/schema\/person\/967901c0176390b9c3fa15c5da47f37b\",\"name\":\"Wojciech Andryszek, Technical Content Writer at GitProtect.io\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/gitprotect.io\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/10\/wojciech-andryszek-technical-content-writer-at-gitprotect.io_avatar-96x96.jpg\",\"contentUrl\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/10\/wojciech-andryszek-technical-content-writer-at-gitprotect.io_avatar-96x96.jpg\",\"caption\":\"Wojciech Andryszek, Technical Content Writer at GitProtect.io\"},\"description\":\"Wojtek is a Technical Content Writer at GitProtect. As a science journalist under his belt, he enjoys all kinds of knowledge. When writing about tech, Wojtek plays the role of an IT professional as well as his opposite - like Dr. Jekyll and Mr. Hyde. ;)\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/wojciech-andryszek\/\"],\"url\":\"https:\/\/gitprotect.io\/blog\/author\/wojciech-andryszek\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Most Common Cybersecurity Mistakes Made by Jira Admins - Blog | GitProtect.io","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/gitprotect.io\/blog\/the-most-common-cybersecurity-mistakes-made-by-jira-admins\/","og_locale":"en_US","og_type":"article","og_title":"The Most Common Cybersecurity Mistakes Made by Jira Admins - Blog | GitProtect.io","og_description":"Let&#8217;s imagine you&#8217;ve inherited a Jira instance. It&#8217;s been running for years. Nobody remembers or knows who set it up. The documentation is a PDF, which was last updated in 2017. Now, you&#8217;ve got 600 users, 47 custom workflows, three broken automations, and a SAML integration duct-taped to a legacy IDP. Welcome to the jungle. And here comes the security audit\u2026","og_url":"https:\/\/gitprotect.io\/blog\/the-most-common-cybersecurity-mistakes-made-by-jira-admins\/","og_site_name":"Blog | GitProtect.io","article_publisher":"https:\/\/www.facebook.com\/XoperoSoftware\/","article_published_time":"2025-05-09T13:59:20+00:00","article_modified_time":"2025-11-20T14:47:23+00:00","og_image":[{"width":2400,"height":1200,"url":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2025\/05\/2x_Human-Error_-The-most-common-cybersecurity-mistakes-of-Jira-Admins.jpg","type":"image\/jpeg"}],"author":"Wojciech Andryszek, Technical Content Writer at GitProtect.io","twitter_card":"summary_large_image","twitter_creator":"@GitProtectio","twitter_site":"@GitProtectio","twitter_misc":{"Written by":"Wojciech Andryszek, Technical Content Writer at GitProtect.io","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/gitprotect.io\/blog\/the-most-common-cybersecurity-mistakes-made-by-jira-admins\/#article","isPartOf":{"@id":"https:\/\/gitprotect.io\/blog\/the-most-common-cybersecurity-mistakes-made-by-jira-admins\/"},"author":{"name":"Wojciech Andryszek, Technical Content Writer at GitProtect.io","@id":"https:\/\/gitprotect.io\/blog\/#\/schema\/person\/967901c0176390b9c3fa15c5da47f37b"},"headline":"The Most Common Cybersecurity Mistakes Made by Jira Admins","datePublished":"2025-05-09T13:59:20+00:00","dateModified":"2025-11-20T14:47:23+00:00","mainEntityOfPage":{"@id":"https:\/\/gitprotect.io\/blog\/the-most-common-cybersecurity-mistakes-made-by-jira-admins\/"},"wordCount":1388,"publisher":{"@id":"https:\/\/gitprotect.io\/blog\/#organization"},"image":{"@id":"https:\/\/gitprotect.io\/blog\/the-most-common-cybersecurity-mistakes-made-by-jira-admins\/#primaryimage"},"thumbnailUrl":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2025\/05\/2x_Human-Error_-The-most-common-cybersecurity-mistakes-of-Jira-Admins.jpg","articleSection":["Git Backup 101","Jira"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/gitprotect.io\/blog\/the-most-common-cybersecurity-mistakes-made-by-jira-admins\/","url":"https:\/\/gitprotect.io\/blog\/the-most-common-cybersecurity-mistakes-made-by-jira-admins\/","name":"The Most Common Cybersecurity Mistakes Made by Jira Admins - Blog | GitProtect.io","isPartOf":{"@id":"https:\/\/gitprotect.io\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/gitprotect.io\/blog\/the-most-common-cybersecurity-mistakes-made-by-jira-admins\/#primaryimage"},"image":{"@id":"https:\/\/gitprotect.io\/blog\/the-most-common-cybersecurity-mistakes-made-by-jira-admins\/#primaryimage"},"thumbnailUrl":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2025\/05\/2x_Human-Error_-The-most-common-cybersecurity-mistakes-of-Jira-Admins.jpg","datePublished":"2025-05-09T13:59:20+00:00","dateModified":"2025-11-20T14:47:23+00:00","breadcrumb":{"@id":"https:\/\/gitprotect.io\/blog\/the-most-common-cybersecurity-mistakes-made-by-jira-admins\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/gitprotect.io\/blog\/the-most-common-cybersecurity-mistakes-made-by-jira-admins\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/gitprotect.io\/blog\/the-most-common-cybersecurity-mistakes-made-by-jira-admins\/#primaryimage","url":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2025\/05\/2x_Human-Error_-The-most-common-cybersecurity-mistakes-of-Jira-Admins.jpg","contentUrl":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2025\/05\/2x_Human-Error_-The-most-common-cybersecurity-mistakes-of-Jira-Admins.jpg","width":2400,"height":1200},{"@type":"BreadcrumbList","@id":"https:\/\/gitprotect.io\/blog\/the-most-common-cybersecurity-mistakes-made-by-jira-admins\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/gitprotect.io\/blog\/"},{"@type":"ListItem","position":2,"name":"The Most Common Cybersecurity Mistakes Made by Jira Admins"}]},{"@type":"WebSite","@id":"https:\/\/gitprotect.io\/blog\/#website","url":"https:\/\/gitprotect.io\/blog\/","name":"GitProtect.io Blog","description":"","publisher":{"@id":"https:\/\/gitprotect.io\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/gitprotect.io\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/gitprotect.io\/blog\/#organization","name":"GitProtect.io","url":"https:\/\/gitprotect.io\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/gitprotect.io\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/05\/favicon-528x528-1.png","contentUrl":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/05\/favicon-528x528-1.png","width":528,"height":528,"caption":"GitProtect.io"},"image":{"@id":"https:\/\/gitprotect.io\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XoperoSoftware\/","https:\/\/x.com\/GitProtectio","https:\/\/www.linkedin.com\/company\/xopero-software\/","https:\/\/www.youtube.com\/channel\/UCiEnl6n0mIO6w7twccz-l2w"]},{"@type":"Person","@id":"https:\/\/gitprotect.io\/blog\/#\/schema\/person\/967901c0176390b9c3fa15c5da47f37b","name":"Wojciech Andryszek, Technical Content Writer at GitProtect.io","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/gitprotect.io\/blog\/#\/schema\/person\/image\/","url":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/10\/wojciech-andryszek-technical-content-writer-at-gitprotect.io_avatar-96x96.jpg","contentUrl":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/10\/wojciech-andryszek-technical-content-writer-at-gitprotect.io_avatar-96x96.jpg","caption":"Wojciech Andryszek, Technical Content Writer at GitProtect.io"},"description":"Wojtek is a Technical Content Writer at GitProtect. As a science journalist under his belt, he enjoys all kinds of knowledge. When writing about tech, Wojtek plays the role of an IT professional as well as his opposite - like Dr. Jekyll and Mr. Hyde. ;)","sameAs":["https:\/\/www.linkedin.com\/in\/wojciech-andryszek\/"],"url":"https:\/\/gitprotect.io\/blog\/author\/wojciech-andryszek\/"}]}},"_links":{"self":[{"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/posts\/6551","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/comments?post=6551"}],"version-history":[{"count":3,"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/posts\/6551\/revisions"}],"predecessor-version":[{"id":6809,"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/posts\/6551\/revisions\/6809"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/media\/6553"}],"wp:attachment":[{"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/media?parent=6551"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/categories?post=6551"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/tags?post=6551"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}