CAIQ Lite

Consensus Assessments Initiative Questionnaire (CAIQ) Lite for Carbon

Section HeadingControl HeadingOriginal IDQuestion TextAnswerNotes
Application & Interface SecurityApplication SecurityAIS-01.2Do you use an automated source code analysis tool to detect security defects in code prior to production?Yes
AIS-01.5(SaaS only) Do you review your applications for security vulnerabilities and address any issues prior to deployment to production?Yes
Customer Access RequirementsAIS-02.1Are all identified security, contractual, and regulatory requirements for customer access contractually addressed and remediated prior to granting customers access to data, assets, and information systems?Yes
Data IntegrityAIS-03.1Does your data management policies and procedures require audits to verify data input and output integrity routines?Yes
Audit Assurance & ComplianceIndependent AuditsAAC-02.1Do you allow tenants to view your SOC2/ISO 27001 or similar third-party audit or certification reports?NoHowever, Carbon runs on Atlassian’s SOC 2 and ISO 27001 certified infrastructure
AAC-02.2Do you conduct network penetration tests of your cloud service infrastructure at least annually?Not ApplicableCarbon’s cloud infrastructure is managed by Atlassian entirely
AAC-02.3Do you conduct application penetration tests of your cloud infrastructure regularly as prescribed by industry best practices and guidance?Not ApplicableCarbon’s cloud infrastructure is managed by Atlassian entirely
Information System Regulatory MappingAAC-03.1Do you have a program in place that includes the ability to monitor changes to the regulatory requirements in relevant jurisdictions, adjust your security program for changes to legal requirements, and ensure compliance with relevant regulatory requirements?Yes
Business Continuity Management & Operational ResilienceBusiness Continuity TestingBCR-02.1Are business continuity plans subject to testing at planned intervals or upon significant organizational or environmental changes to ensure continuing effectiveness?Yes
PolicyBCR-10.1Are policies and procedures established and made available for all personnel to adequately support services operations’ roles?Yes
Retention PolicyBCR-11.1Do you have technical capabilities to enforce tenant data retention policies?Not ApplicableClient data lives on Atlassian’s cloud infrastructure
BCR-11.3Have you implemented backup or recovery mechanisms to ensure compliance with regulatory, statutory, contractual or business requirements?Not ApplicableClient data lives on Atlassian’s cloud infrastructure
BCR-11.7Do you test your backup or redundancy mechanisms at least annually?Not ApplicableClient data lives on Atlassian’s cloud infrastructure
Change Control & Configuration ManagementUnauthorized Software InstallationsCCC-04.1Do you have controls in place to restrict and monitor the installation of unauthorized software onto your systems?Partially
Data Security & Information Lifecycle ManagementE-commerce TransactionsDSI-03.1Do you provide standardized (e.g. ISO/IEC) non-proprietary encryption algorithms (3DES, AES, etc.) to tenants in order to protect their sensitive data both at rest and in transit as appropriate?Not ApplicableData storage is managed by Atlassian
Handling / Labeling / Security PolicyDSI-04.5Are policies and procedures established for the labeling, handling, and security of data and objects that contain data?Yes
Non-Production DataDSI-05.1Do you have procedures in place to ensure production data shall not be replicated or used in non-production environments?Yes
Ownership / StewardshipDSI-06.1Are your responsibilities and those of your tenants in terms of data stewardship clearly defined and communicated through agreement with each tenant?Yes
Secure DisposalDSI-07.1Do you support the secure deletion (e.g., degaussing/cryptographic wiping) of archived and backed-up data?Not ApplicableData storage is managed by Atlassian
DSI-07.2Can you provide a published procedure for exiting the service arrangement, including assurance to sanitize all computing resources of tenant data once a customer has exited your environment or has vacated a resource?Not ApplicableCarbon has been architected in such a way that our staff and systems are not able to acquire and keep client data
Datacenter SecurityAsset ManagementDCS-01.2Do you maintain a complete inventory of all of your critical assets located at all sites/ or geographical locations and their assigned ownership?Yes
Controlled Access PointsDCS-02.1Are physical security perimeters (e.g., fences, walls, barriers, guards, gates, electronic surveillance, physical authentication mechanisms, reception desks, and security patrols) implemented for all areas housing sensitive data and information systems?Not ApplicableData storage is managed by Atlassian
User AccessDCS-09.1Do you restrict physical access to information assets and functions by users and support personnel?Yes
Encryption & Key ManagementKey GenerationEKM-02.1Do you have a capability to allow creation of unique encryption keys per tenant?Not ApplicableData storage is managed by Atlassian
EncryptionEKM-03.1Do you encrypt tenant data at rest (on disk/storage) within your environment?Not ApplicableData storage is managed by Atlassian
Governance and Risk ManagementBaseline RequirementsGRM-01.1Do you have documented information security baselines for every component of your infrastructure (e.g., hypervisors, operating systems, routers, DNS servers, etc.)?Not ApplicableCarbon’s cloud infrastructure is managed by Atlassian entirely
PolicyGRM-06.1Are your information security policies and procedures made available to all impacted personnel and business partners, authorized by accountable business role/function and supported by the information security management program as per industry best practices (e.g. ISO 27001, SOC 2)?Yes
Policy EnforcementGRM-07.1Is a formal disciplinary or sanction policy established for employees who have violated security policies and procedures?Yes
Human Resources SecurityBackground ScreeningHRS-02.1Pursuant to local laws, regulations, ethics, and contractual constraints, are all employment candidates, contractors, and third parties subject to background verification?Yes
Employment AgreementsHRS-06.1Do your employment agreements incorporate provisions and/or terms in adherence to established information security policies?Yes
Employment TerminationHRS-09.5Are employees trained to recognize and raise a concern about indicators that might suggest activities that might constitute insider threat?Yes
Identity & Access ManagementAudit Tools AccessIAM-01.1Do you restrict, log, and monitor access to your information security management systems (e.g., hypervisors, firewalls, vulnerability scanners, network sniffers, APIs, etc.)?Not ApplicableCarbon’s cloud infrastructure is managed by Atlassian entirely
IAM-01.2Do you monitor and log privileged access (e.g., administrator level) to information security management systems?Not ApplicableCarbon’s cloud infrastructure is managed by Atlassian entirely
Credential Lifecycle / Provision ManagementIAM-02.1Do you have a formally documented process or procedure to govern the life cycle of user identities (both employees and customers)?Yes
IAM-02.2Do user credentials require a minimum of 8 characters of at least one letter and one number?Yes
Diagnostic / Configuration Ports AccessIAM-04.1Are all utility programs capable of potentially overriding system, object, network, virtual machine, and application controls, restricted?Not ApplicableCarbon’s cloud infrastructure is managed by Atlassian entirely
Policies and ProceduresIAM-05.1Do you have a process for linking all access to user account identities?Yes
Segregation of DutiesIAM-09.1Do you provide tenants with segregated environments (separate applications, databases, and platform components), or is it multi-tenant?Yes
Source Code Access RestrictionIAM-10.1Are controls in place to prevent unauthorized access to your application, program, or object source code, and assure it is restricted to authorized personnel only?Yes
User Access AuthorizationIAM-12.1Do you manage and store the identity of all personnel who have access to the IT infrastructure, including their level of access?Yes
Infrastructure & Virtualization SecurityAudit Logging / Intrusion DetectionIVS-01.1Are file integrity (host) and network intrusion detection (IDS) tools implemented to help facilitate timely detection, investigation by root cause analysis, and response to incidents?Not ApplicableCarbon’s cloud infrastructure is managed by Atlassian entirely
IVS-01.4Do you log and alert any changes made to virtual machine images regardless of their running state (e.g., runnable, suspend, or off)?Not ApplicableCarbon’s cloud infrastructure is managed by Atlassian entirely
IVS-01.5Are file integrity monitoring (FIM) tools or intrusion detection systems (IDS), configured, implemented, and managed to protect cloud resources including virtual and physical networks?Not ApplicableCarbon’s cloud infrastructure is managed by Atlassian entirely
Network SecurityIVS-06.1Do you use network security controls to deny traffic by default and allow traffic by exception (e.g., traffic directed through firewalls or access control lists [ACLs]) in your network?Not ApplicableCarbon’s cloud infrastructure is managed by Atlassian entirely
OS Hardening and Base ControlsIVS-07.1Are operating systems hardened to provide only the necessary ports, protocols, and services to meet business needs using secure configurations?Not ApplicableCarbon’s cloud infrastructure is managed by Atlassian entirely
Production / Non-Production EnvironmentsIVS-08.1Are production and non-production environments separated to prevent unauthorized access or changes to production environments and information?Yes
SegmentationIVS-09.1Are systems, data, and network diagrams/architecture documented and updated as changes occur?Yes
Wireless SecurityIVS-12.3Are policies and procedures established and mechanisms implemented to protect wireless network environments and detect the presence of unauthorized (rogue) network devices for a timely disconnect from the network?Yes
Interoperability & PortabilityAPIsIPY-01.1Do you publish a list of all APIs available in the service and indicate which are standard and which are customized?NoCarbon does not publish any API
Mobile SecurityApproved ApplicationsMOS-03.1Do you have a policy enforcement capability (e.g., XACML) to ensure that only approved applications and those from approved application stores can be loaded onto a mobile device?NoEmployees are not provided with mobile devices
Security Incident Management, E-Discovery, & Cloud ForensicsIncident ManagementSEF-02.1Do you have a documented security incident response plan?Yes
SEF-02.4Have you tested your security incident response plans in the last year?Yes
Incident ReportingSEF-03.1Are workforce personnel and external business relationships adequately informed of their responsibility, and, if required, consent and/or contractually required to report all information security events in a timely manner?Yes
SEF-03.2Do you have predefined communication channels for workforce personnel and external business partners to report incidents in a timely manner adhering to applicable legal, statutory, or regulatory compliance obligations?Yes
Incident Response Legal PreparationSEF-04.4Do you enforce and attest to tenant data separation when producing data in response to legal subpoenas?Yes
Supply Chain Management, Transparency, and AccountabilityIncident ReportingSTA-02.1Do you make security incident information available to all affected customers and providers periodically through electronic methods (e.g., portals)?Yes
Network / Infrastructure ServicesSTA-03.1Do you collect capacity and use data for all relevant components of your cloud service offering?Yes
Third Party AgreementsSTA-05.4Do third-party agreements include provision for the security and protection of information and assets?YesAtlassian maintains SOC 2 and ISO 27001 certifications and provides comprehensive security commitments
STA-05.5Do you have the capability to recover data for a specific customer in the case of a failure or data loss?YesThrough Atlassian
Supply Chain MetricsSTA-07.4Do you provide tenants with ongoing visibility and reporting of your operational Service Level Agreement (SLA) performance?NoService availability is directly dependent on Atlassian’s cloud infrastructure
Third Party AuditsSTA-09.1Do you mandate annual information security reviews and audits of your third party providers to ensure that all agreed upon security requirements are met?Yes
Threat and Vulnerability ManagementAntivirus / Malicious SoftwareTVM-01.1Do you have anti-malware programs that support or connect to your cloud service offerings installed on all of your IT infrastructure network and systems components?Yes
Vulnerability / Patch ManagementTVM-02.5Do you have a capability to patch vulnerabilities across all of your computing devices, applications, and systems?Yes
Mobile CodeTVM-03.1Is mobile code authorized before its installation and use, and the code configuration checked, to ensure that the authorized mobile code operates according to a clearly defined security policy?Yes

Last Updated: December 1, 2025