Security

CAIQ Lite v4

Consensus Assessments Initiative Questionnaire — self-assessment based on the CSA Cloud Controls Matrix (CCM) v4 framework.

Last updated: March 26, 2026 · Back to Security Statement

46
Controls
35
Yes
4
Partial
2
No
5
N/A
Compliance Rate (Yes + Partial / Applicable): 95.1%

Important context

SuperTemplates.ai is a Forge-native Jira Cloud app for AI-powered bulk task creation. All compute and data storage runs on Atlassian Forge infrastructure (Forge KVS for storage). SuperTemplates.ai does not operate its own servers, databases, or cloud infrastructure. The only outbound calls from Forge are to AI providers (Vertex AI, Cerebras, or BYOK providers) for task generation, using anonymized data. Many infrastructure-specific controls are marked N/A, as Atlassian Forge provides these controls (SOC 2 Type II, ISO 27001).

AISApplication & Interface Security

IDControlStatus
AIS-01

Are secure software development lifecycle (SSDLC) practices applied?

TypeScript strict mode with no-explicit-any ESLint rule. Zod schema validation (34 schema files, 50+ resolver validations). Vitest testing (64 test files across 3 workspaces). Code review via git. Mandatory lint checkpoint after every code change.

Yes
AIS-02

Is automated application security testing performed?

ESLint with TypeScript strict rules blocks unsafe patterns (any, as any). Vitest automated tests cover resolvers and services. No dedicated SAST/DAST tools. Working towards automated security scanning.

Partial
AIS-03

Are APIs designed and deployed with leading security practices?

Forge resolvers validate all input with Zod .safeParse(). All external API calls use HTTPS exclusively. API keys stored via storage.setSecret() (Forge encrypted storage). Bearer token authentication for AI providers. Edition-gating restricts sensitive operations to Advanced license.

Yes
AIS-04

Are application security risks formally assessed?

Security audit covering manifest scopes, dependency vulnerabilities, entity storage, and egress review. asApp() vs asUser() audit performed. Identified vulnerabilities tracked with action items. Customers report concerns to security@supertemplates.ai.

Yes

AACAudit Assurance & Compliance

IDControlStatus
AAC-01

Are independent audit assessments conducted at least annually?

As an independent startup, SuperTemplates.ai does not currently undergo third-party security audits (e.g., SOC 2, ISO 27001). Internal security reviews are conducted regularly. Third-party audits will be pursued as the business scales. The app inherits Atlassian Forge’s SOC 2 Type II and ISO 27001 certifications for platform-level controls.

No
AAC-02

Are risk-based corrective actions tracked to closure?

Findings from internal security reviews are tracked with action items. Dependency vulnerabilities tracked with severity and remediation steps. Customer-reported issues addressed through support channels.

Yes

BCRBusiness Continuity

IDControlStatus
BCR-01

Is a business continuity plan established?

Source code in Git with multiple remotes. App runs on Atlassian Forge (Atlassian handles infrastructure BC/DR). No formal written BCP document. App is stateless — Forge KVS handles data persistence with Atlassian’s redundancy guarantees.

Partial
BCR-02

Are business continuity plans tested?

No formal BC testing performed. Reliance on Atlassian Forge infrastructure redundancy. Will formalize BC testing as the business scales.

No
BCR-03

Are redundant systems maintained for critical operations?

Source code in Git version control with remote backups. All persistent data in Forge KVS (Atlassian-managed redundancy, AWS infrastructure). No external databases — single storage layer reduces failure modes.

Yes

CCCChange Control & Configuration

IDControlStatus
CCC-01

Are change management policies followed?

All changes tracked in Git version control. ESLint + Prettier enforce code standards. TypeScript strict compilation. Mandatory lint checkpoint after every code change. Changes documented in commit messages.

Yes
CCC-02

Is risk assessment performed before deployment?

Tripwire system requires evidence before editing shared files. Preflight evidence (target, entry, scope) required for non-trivial edits. Impact analysis for shared components. Blast radius assessment before deploying.

Yes
CCC-03

Are configuration management practices applied?

Build configurations version controlled. Manifest versioned in Git. Release builds follow repeatable process. Environment-specific configs managed separately.

Yes

CEKCryptography & Encryption

IDControlStatus
CEK-01

Are cryptographic controls implemented to protect data?

All external API calls use HTTPS exclusively (TLS 1.2+). AES-256 encryption at rest via Atlassian Forge infrastructure. API keys encrypted via storage.setSecret(). SHA-256 hashing for analytics identifiers. U-code pseudonymization before AI provider calls.

Yes
CEK-02

Are encryption key management procedures established?

BYOK API keys managed by site administrators via admin panel. Keys stored in Forge encrypted secrets storage. Admins can add, revoke, and rotate keys. Platform-owned keys managed via Forge environment variables.

Yes
CEK-03

Are industry-standard cryptographic algorithms used?

TLS 1.2+ for all connections (Forge runtime enforces). AES-256 at rest (Atlassian Forge infrastructure). SHA-256 for analytics hashing. All AI provider connections over HTTPS. No deprecated protocols used.

Yes

DCSDatacenter Security

IDControlStatus
DCS-01

Are physical security controls implemented?

SuperTemplates.ai does not operate datacenters or servers. The app runs entirely on Atlassian Forge (sandboxed cloud runtime). Atlassian maintains SOC 2 Type II and ISO 27001 certifications covering physical infrastructure security.

N/A

DSPData Security & Privacy

IDControlStatus
DSP-01

Are data classification and handling policies established?

AI Data Processing Policy classifies data into: sent to AI (prompts, pseudonymized names, field metadata), NOT sent (account IDs, emails, credentials, existing issue content), and analytics (anonymized). Clear data flow documented.

Yes
DSP-02

Are data privacy policies aligned with regulations?

Published Privacy Policy (GDPR, CCPA, EU AI Act compliant), DPA (GDPR Article 28), Terms of Service. PostHog EU instance for analytics. Admin toggle to disable all analytics egress.

Yes
DSP-03

Are procedures in place for secure data disposal?

Cerebras (Advanced tier): zero data retention. Vertex AI: no training on API data, up to 90-day abuse monitoring retention (opt-out available with BYOK). Prompt logs: 30-day configurable retention in Forge KVS. Forge KVS: data deleted on app uninstall. No external databases to dispose.

Yes
DSP-04

Are data retention policies defined?

Cerebras (Advanced tier): zero retention. Vertex AI: no training, up to 90-day abuse monitoring retention (opt-out with BYOK). BYOK providers (OpenAI, Anthropic, Gemini): per provider API terms, no training on API data. Prompt logs: 30-day retention (Forge KVS). Templates/preferences: persisted in Forge KVS until uninstall. Analytics: PostHog EU retention per their policy. All documented in Privacy Policy.

Yes
DSP-05

Is personal data processed in accordance with legal requirements?

GDPR compliance: DPA available, U-code pseudonymization, data minimization, admin controls. Processing limited to task generation prompts. No existing Jira issue content sent to AI. Admins control which models are available and can disable analytics.

Yes

GRCGovernance, Risk & Compliance

IDControlStatus
GRC-01

Is an information security management programme established?

Security policy published at supertemplates.ai/security. Internal security reviews documented. No formal ISMS framework (ISO 27001). Security considerations integrated into development workflow via automated checks and mandatory lint checkpoints.

Partial
GRC-02

Are roles and responsibilities for security defined?

Founder/developer with direct accountability for all security decisions. Security contact: security@supertemplates.ai. 2-business-day acknowledgment commitment.

Yes
GRC-03

Is a risk management process implemented?

Risks identified through security audits, dependency vulnerability tracking, and incident documentation. Tripwire system prevents high-risk code changes without evidence.

Yes
GRC-04

Are legal/regulatory requirements identified?

GDPR, EU AI Act, CCPA, Atlassian Marketplace requirements tracked. Published Privacy Policy, DPA, Terms of Service.

Yes

HRSHuman Resources Security

IDControlStatus
HRS-01

Are background checks performed?

Solo founder/developer operation. No employees or contractors with system access. Will implement background checks when hiring.

N/A
HRS-02

Is security awareness training provided?

Developer maintains current knowledge of security threats, secure coding practices (TypeScript strict mode, Zod validation, OWASP awareness), and data protection requirements.

Yes
HRS-03

Are access rights revoked on termination?

Solo operation. No termination scenarios currently. Will implement offboarding procedures when team grows.

N/A

IAMIdentity & Access Management

IDControlStatus
IAM-01

Is a formal user access management process implemented?

Forge handles user authentication via Atlassian OAuth. App access controlled by Jira site admin installation. BYOK key management gated to Advanced edition. Admin panel restricted to site administrators.

Yes
IAM-02

Is MFA enforced for critical systems?

MFA enabled for: GitHub (source code), Atlassian Developer Console (app management), Google Cloud (Vertex AI), and all cloud provider accounts. Forge runtime authentication handled by Atlassian (supports customer MFA policies).

Yes
IAM-03

Are access rights reviewed regularly?

Jira scope audit performed — all 11 scopes verified as least-privilege. No over-permissioning detected. Egress domains reviewed and documented.

Yes
IAM-04

Are unique user identifiers assigned?

Forge provides unique accountId per Atlassian user. No shared accounts. App uses U-code system for pseudonymized AI processing. PostHog uses SHA-256 hashed accountIds.

Yes

IVSInfrastructure & Virtualisation

IDControlStatus
IVS-01

Are network security controls implemented?

SuperTemplates.ai does not operate cloud infrastructure. Forge runs in Atlassian’s sandboxed cloud environment with network isolation enforced by the platform.

N/A
IVS-02

Is network architecture designed with security zones?

Forge provides sandboxed execution environment. No customer-managed network infrastructure. Atlassian handles network segmentation and security zones.

N/A

LOGLogging & Monitoring

IDControlStatus
LOG-01

Are logging and monitoring capabilities implemented?

Forge runtime logging for system events. PostHog EU for anonymized product analytics (admin-toggleable). Abuse detection system monitors suspicious bulk operations. Prompt logger stores metadata to Forge KVS (30-day retention). Console logs capture metadata (counts, timing) but NOT user prompt content.

Yes
LOG-02

Are logs reviewed and retained adequately?

Prompt logs: 30-day retention in Forge KVS. Analytics: PostHog EU retention. Forge platform logs: Atlassian-managed. Abuse detection logs in Forge KVS for admin review.

Yes

SEFSecurity Incident Management

IDControlStatus
SEF-01

Is an incident response plan established?

Published at supertemplates.ai/security: 72-hour breach notification to affected administrators, 2-business-day acknowledgment for security reports, security@supertemplates.ai contact.

Yes
SEF-02

Are security incidents managed through a defined process?

Security reports via security@supertemplates.ai. Incidents triaged by severity. Critical security patches prioritized. DPA commits to 72-hour notification with disclosure details.

Yes
SEF-03

Are post-incident reviews conducted?

Incidents documented with root cause analysis and preventive measures integrated into development workflow.

Yes

STASupply Chain Management

IDControlStatus
STA-01

Is supply chain risk management implemented?

pnpm for dependency management with lockfile. Dependency audit performed: vulnerabilities identified in transitive dependencies and tracked with severity and remediation steps.

Yes
STA-02

Are third-party components assessed for vulnerabilities?

pnpm audit performed. Vulnerabilities categorized by severity. Risk assessment notes most are transitive/build-only, not shipped to production Forge runtime. Actionable fixes identified.

Yes
STA-03

Are software dependencies documented and tracked?

package.json files for all workspaces. pnpm-lock.yaml ensures reproducible builds. pnpm workspace configuration for monorepo management.

Yes

TVMThreat & Vulnerability Management

IDControlStatus
TVM-01

Is a vulnerability management process established?

Vulnerabilities identified through pnpm audit, internal code review, and security audits. All known vulnerabilities categorized with remediation plan.

Yes
TVM-02

Are vulnerability scans/penetration tests performed?

pnpm audit for dependency scanning. ESLint security rules enforced. Internal code review for each change. No formal external penetration testing performed.

Partial
TVM-03

Are security patches applied timely?

Dependency updates tracked. Actionable fixes identified for known vulnerabilities. Atlassian toolkit updates dependent on Atlassian release cycle. Security patches prioritized in development workflow.

Yes

UEMEndpoint Management

IDControlStatus
UEM-01

Are endpoint security controls implemented?

Development systems protected with OS security updates and secure configuration. MFA enabled on all critical services. Access to development environments restricted to authorized devices.

Yes

Notes

  • N/A responses reflect that SuperTemplates.ai runs on Atlassian Forge — no owned infrastructure, servers, or databases.
  • HRS N/A responses reflect solo founder/developer operation.
  • “Partial” responses indicate controls in place but where formalization or additional tooling is being pursued.
  • “No” responses are honest disclosures: no independent audits (AAC-01) and no formal BC plan testing (BCR-02). These are typical for early-stage startups. The app inherits Atlassian Forge's SOC 2 and ISO 27001 certifications for all platform-level controls.
  • This questionnaire is reviewed and updated annually or when significant changes occur.

Security Contact

For security questions or to request additional documentation: security@supertemplates.ai