← Tech Cachet home

Security Overview: Tech Cachet

At Tech Cachet, security is a foundational component of our development process. This page provides a detailed overview of our security controls, vulnerability management, and incident response procedures for our Atlassian Forge applications.


1. Architecture & Data Handling

Our applications are built exclusively on the Atlassian Forge platform. This architecture allows us to inherit the robust security and compliance controls provided by Atlassian.


2. Security Controls & SDLC

We follow a secure Software Development Life Cycle (SDLC) to ensure the integrity and security of our code.


3. Vulnerability Management

We are committed to identifying and remediating security vulnerabilities rapidly.


4. Incident Response

In the event of a security incident, Tech Cachet follows a structured response process:

  1. Identification: Active monitoring and report ingestion to identify potential breaches or misconfigurations.
  2. Triage & Containment: Rapid assessment of the incident scope followed by immediate measures to prevent further impact.
  3. Resolution: Deployment of patches or configuration changes to resolve the root cause.
  4. Notification: If a security incident affects customer data, we will notify affected customers via their primary Atlassian contact email within 72 hours of becoming aware of the incident.
  5. Post-Mortem: A detailed review of the incident to prevent recurrence and improve our defensive posture.

5. Security Contact

For questions regarding our security practices or to report a security concern, please contact:

Security Team
Email: security@techcachet.com
Subject: “Security Inquiry” or “Security Report”


For legal terms and privacy details, please visit our Privacy Policy and Terms of Service.


← Tech Cachet home