Skip to content

Security Policy

OwnerFlowdence Security and Engineering
Applies to appMuleSight for Confluence
Review cadenceQuarterly and after security-significant changes
  • Least privilege on app scopes and egress.
  • Secure secret storage with no hardcoded credentials.
  • Cache-first resilience without exposing sensitive material.
  • Structured logging with redaction.
  • Global configuration writes are context-guarded.
  • Data fetches are constrained to configured MuleSoft org and environment inputs.
  • Mutating config actions are routed through resolver functions with controlled entry points.
  • MuleSoft client secret and OAuth token are stored in Forge secret storage.
  • Token cache invalidation occurs on auth context changes and 401 retry flows.
  • Outbound fetch is restricted to MuleSoft endpoint(s) declared in manifest.
  • No broad wildcard egress is configured.
  • Logs are structured and redacted for keys resembling tokens/secrets/passwords/authorization.
  • Operational errors are captured without dumping raw secret values.
  • Security defects are triaged by severity and tracked to remediation.
  • Marketplace security requirement timelines are treated as release constraints.
  • Incident process and communication standards are defined in operational runbooks.
  • Security escalation contact: security@flowdence.io.

MuleSight operates on Forge infrastructure; platform and app responsibilities are split per Atlassian shared responsibility guidance.

This app-specific policy is read together with the shared Flowdence baseline: