Data at rest
Every customer has his own, separate database that stores synchronization profiles in Cloud SQL.
These databases do not have a public IP and are not accessible to the outside world.
They interoperate with the rest of the system over a VPC.
In order to synchronize data between Jira and Azure, Synchronizer requires read / write access to both systems. Such access is granted by providing access tokens (PAT) during synchronization profile configuration.
PAT are encrypted using Cloud Key Management using a private symmetric key, fully managed by GCP.
After encryption PATs are stored together with the synchronization profile in Cloud SQL database.
Data from external systems
During synchronization, Synchronizer needs to store identities of synchronized object pairs.
We only store object identities, and not the whole objects themselves.
This data is stored in Datastore and is guaranteed to be retained as long as the customer has a paying subscription to the product.
Identities of the following objects are stored, both for Jira and Azure DevOps Services:
- Work item Ids / issue Ids
- Comment Ids
- Attachment Ids
These logs have been specifically designed to report problems that a customer can fix, and refer to.
These logs are stored in Datastore, and are guaranteed to be retained as long as the customer has a paying subscription to the product.
Platform logs include application, infrastructure, and audit logs are stored using Google Cloud's operations suite with a maximum retention period of 30 days.
These logs are not visible to any customer, and needed for audit, maintenance and troubleshooting.
PII and UGC in logs
Synchronizer does not add any PII to logs.
Synchronizer does not any UGC to logs, however we reserve the right to temporarily extend logging with such data when it is necessary to troubleshoot an incident.
Please note that external systems, including Jira and Azure can unintentionally return data, containing PII or UGC, as a part of an error message.
In such cases, Synchronizer will log this data "as is", without making any attempt to discover or remove sensitive data.
Data sub processors
This page has no comments.