Book Image

Implementing Atlassian Confluence

By : Eren Kalelioğlu
Book Image

Implementing Atlassian Confluence

By: Eren Kalelioğlu

Overview of this book

Implementing Atlassian Confluence is an all-encompassing guide to the essential concepts of distributed work and leveraging Confluence to create a world-class collaboration environment. This book begins with an introduction to enterprise collaboration concepts and explains how to set up Confluence. You’ll quickly proceed to creating and maintaining dynamic content, effective cross-functional collaboration, and employing Confluence applications in scenarios such as software project management and knowledge bases. You’ll discover how to use Jira Service Management together with Confluence, set up personal spaces, implement centralized user management, address security risks, and explore suggested solutions on Confluence. Furthermore, you’ll integrate and extend Confluence with other Atlassian and third-party software. The book also contains tips and guidance on managing Confluence adoption, enabling you to focus on your team and provide them with a state-of-the-art remote collaboration environment. Complete with practical business scenarios, best practices, and examples, this book will help you gain a comprehensive understanding of Atlassian Confluence’s capabilities for enhancing collaboration within cross-functional teams.
Table of Contents (21 chapters)
1
Part 1:Preparing for Confluence
7
Part 2:Building a Real Confluence Site
13
Part 3:Scaling Business

The basic concepts of information security

Being familiar with the basic concepts related to information security will significantly assist you in securing the Confluence environment you manage. Here, we will go over a few of them:

  • Authentication: Verifying users’ identities helps ensure that only authorized individuals gain access
  • Authorization: Determining what different users and roles can access helps prevent information from falling into the wrong hands
  • Encryption: Encrypting sensitive information in storage and during transmission makes unauthorized access more difficult
  • Firewalls and network security: This helps protect a network against internal and external threats
  • Data integrity: Maintaining the accuracy and consistency of data is critical for secure and accurate decision-making
  • Privacy and compliance: Personal and sensitive data must be protected, and appropriate legal and regulatory requirements must be met (e.g., GDPR)
  • Monitoring...