Skip to content

MuleSight Security Policy

OwnerFlowdence Security and Engineering
Applies to appMuleSight for Confluence
Review cadenceQuarterly and after security-significant changes
  • Least privilege on app scopes and egress.
  • Secure secret storage with no hardcoded credentials.
  • Cache-first resilience without exposing sensitive material.
  • Structured logging with redaction.
  • Global configuration writes are context-guarded.
  • Data fetches are constrained to configured MuleSoft org and environment inputs.
  • Mutating config actions are routed through resolver functions with controlled entry points.
  • MuleSoft client secret and OAuth token are stored in Forge secret storage.
  • Token cache invalidation occurs on auth context changes and 401 retry flows.
  • Outbound fetch is restricted to MuleSoft endpoint(s) declared in manifest.
  • No broad wildcard egress is configured.
  • Logs are structured and redacted for keys resembling tokens/secrets/passwords/authorization.
  • Operational errors are captured without dumping raw secret values.
  • Security defects are triaged by severity and tracked to remediation.
  • Marketplace security requirement timelines are treated as release constraints.
  • Incident process and communication standards are defined in operational runbooks.
  • Security escalation contact: security@flowdence.io.

MuleSight operates on Forge infrastructure; platform and app responsibilities are split per Atlassian shared responsibility guidance.

MuleSight’s highest-risk materials are MuleSoft connected-app secrets, OAuth token material, cached operational snapshots, and diagnostics results. Secrets and token material are stored in Forge secret storage. Dataset caches are keyed by product context and refreshed through controlled resolver paths.

Outbound network access is restricted to Anypoint endpoints required for product behavior. Required OAuth scopes are documented in configuration and diagnostics surfaces so customers can identify missing, partial, or excessive scope coverage. Structured logs redact token-like and secret-like values and avoid dumping raw Anypoint responses when reporting supportable errors.

This app-specific policy is read together with the shared Flowdence baseline: