YouTrack InCloud 2017.3 Help

Secure Your Installation

YouTrack is developed with security in mind. We take great care to eliminate exposures to different types of attacks. We work with third-parties who scan YouTrack for vulnerabilities and perform penetration tests. When a security issue is discovered, we strive to address the problem in the next major version or bug-fix release.

The recommendations on this page are intended to help you keep your YouTrack data secure. These best practices can help you avoid pitfalls that leave your data vulnerable to theft, damage, or loss.

Document Your Setup

Documentation is an important part of your security plan. If your YouTrack administration changes hands, the new administrator shouldn't have to learn how the application is configured through trial and error. As you follow this guide to secure your YouTrack environment, make a note of each change and explain why you set it up the way you did. When done, collect your notes and add them to your information security policy documentation.

Stay Up To Date

Your YouTrack InCloud instance is always upgraded to the latest version of the product.

To prevent accidental disclosure, we usually restrict the visibility to issues that are classified as a Security Problem to members of the JetBrains team. You may see issues in the Security Problem section of our release notes, but this is by no means a comprehensive list of security-related issues that have been fixed in any given release.

Encrypt Local Copies of your Database

YouTrack stores passwords in the database as hash values. Passwords are hashed using the SHA-1 cryptographic hash function.

The YouTrack database, however, is not encrypted. If you export and store backup copies of your database, we recommend that you apply filesystem-level or full disc encryption to the machine that you use to store the data.

Restrict Cross-origin Requests

If you have integrations or web services that request data from outside your YouTrack domain, you can restrict access to specific origins. YouTrack supports cross-origin resource sharing, or CORS.

To protect your data from malicious attacks, create a fixed whitelist of trusted origins that are allowed access. You can manage this whitelist in the REST API section of the Global Settings page. For more information, see REST API Settings.

Use Digital Certificates

All YouTrack InCloud instances use HTTPS to encrypt traffic between the server and web browser, including the transmission of login data. However, your connections to third-party services can use HTTP. When you enable an integration in YouTrack, you need to secure the data that is exchanged between YouTrack and the connected service. Obtain an SSL certificate for each external service and import the certificates into YouTrack.

  • You should import trusted SSL certificates for any external application that is integrated with YouTrack. For more information, see SSL Certificates.
  • You should also have an SSL keystore that identifies YouTrack as a client when it tries to connect to a third party. For more information, see SSL Keystores.

The following integrations can be configured to establish a secure connection using SSL:

You should also use a digital certificate to secure the connection to the SMTP server if you use an external mail server to send email notifications from YouTrack.

Use Two-factor Authentication

Most of the third-party authentication modules that you can use to manage logins in YouTrack support two-factor authentication (2FA). Some even let you require the use of 2FA by every member of your organization.

With 2FA, users must use a secondary device to generate an authentication code, which they must then enter when they log in with their password. This adds an extra layer of security. Even if a password is compromised, the malicious user cannot access the application without the authentication code from the secondary device.

When users enable 2FA, they need to enter an authentication code every time they log into YouTrack with the account that is managed in the connected service.

Enforce a Password Policy

If you're using third-party services for authentication and don't require 2FA, you can't guarantee that every user sets it up. Or uses a strong password.

Here's what you do know:

  • Many users don't create unique passwords for each of their accounts.
  • Most passwords are extremely weak and easy to crack.
  • An attacker only has to guess one weak password to gain access to your system.

The Hub authentication module lets you ensure that users create passwords that keep your data safe. If you use this module to manage logins, we recommend that you set the Password Strength to Good or Very Strong. For more information, see Set a Password Policy.

Banish Bots

The Hub authentication module lets users register their own accounts in YouTrack. If you allow self-registration, you should protect your instance from registration bots. These bots can consume resources and claim licenses that are intended for use by humans.

To block registration bots, enable reCAPTCHA in the Hub authentication module. For more information, see Hub Authentication Module.

Throttle Failed Login Attempts

Throttling or rate limitation helps protect the application from brute-force attacks. The Hub authentication module has settings that let you apply rate limits to logins and requests to verify credentials. Rate limits are applied per IP address. Rate limits help slow down brute-force attacks by blocking new login requests for a short time following a series of consecutive login failures, so they keep your passwords safe.

These rate limits are only applied to logins that are processed by the Hub authentication module. Logins from third-party authentication providers are subject to their own rate limitations.

If you use the Hub authentication module, we strongly recommend that you enable this feature. For more information, see Hub Authentication Module.

Grant Permissions with Care

All of the operations in YouTrack are managed by a permission scheme. Permissions are assigned to a collection of roles, which are then granted to users and groups for a specific project. Users only have permission to perform the operations that are allowed for the role that they are assigned in each project.

If you are overly-generous with granting permissions, you expose your system to high risk from insider threats. It also gives external hackers access to sensitive data as soon as any of your accounts is compromised.

We recommend that you follow the principle of least privilege and only grant access to the information and resources that are absolutely necessary to perform the operations that are required for each user. Start small, then go bigger — but only with good reason. Follow these guidelines to prevent unnecessary access to sensitive data:

  • Grant as little access as necessary to new accounts, then add permissions if necessary.
  • Revoke access when it is no longer required.
  • Delete or ban unnecessary user accounts.
  • Avoid the auto-join groups option if user registration is enabled in the Hub authentication module.
  • Limit the permissions that are available to the Guest user account.
  • Grant roles with very limited permissions to the All Users and Registered Users groups.
  • Limit the number of users who are assigned roles in the Global project.
  • Use as few accounts with System Admin roles as possible and monitor their activity.

Secure the Default Administrator Account

You set the login password for the default administrator account when you confirm the registration for your YouTrack InCloud instance. These credentials are assigned to the root user account. This account has permission to perform any operation in YouTrack.

One of the most common problems detected by risk and security audits is an administrator account that is not tied to a specific individual. You might be tempted to create a simple login and password combination and share the default administrator account with more than one administrator. Don't.

  • Shared accounts are often used to gain uncontrolled access to systems.
  • Audit events and logs are rendered useless when you cannot associate a change with a specific individual.
  • Administrator accounts have unlimited access and should use the strongest possible passwords.

Follow these guidelines to secure your default administrator account:

  • After initial setup, create personal user accounts for each administrator and grant them the required level of access. Administrators should use their own accounts to perform administrative tasks.
  • Limit the number of accounts with administrative access rights to the users who require this level of access.
  • Require that users with administrator privileges use strong passwords and change them periodically.
  • Revoke administrative access as soon as it is no longer required.
  • Manage ownership of the default administrator account carefully. If the user who is responsible for this account leaves your organization or is no longer responsible for the application, select another user to assume ownership and transfer this responsibility. If the previous administrator no longer requires access to YouTrack:
    • Use the Merge User operation to combine these two user accounts. For more information, see Merge User Accounts.
    • Remove the login credentials for the previous administrator from the merged user account.
    If the previous administrator still requires access to YouTrack in a non-administrative role:
    • Create a new user account for the previous administrator and grant the appropriate level of access to the account.
    • Use the Merge User operation as described above to transfer ownership of the default administrator account to the new administrator.

We associate the email address that was used to register your YouTrack InCloud instance with your subscription plan. If the user who registered your instance no longer manages the subscription, open a ticket with the YouTrack support team and provide the email address of the user who is now responsible for your instance.

Browse Audit Events

YouTrack provides tools that let you monitor your application for suspicious activity. The Audit Events page provides a list of events, targets, and authors for every event that is logged in YouTrack. These events are recorded every time an operation is applied to a target entity that is managed by the built-in Hub service. This includes changes that are applied to users, groups, projects, roles, auth modules, services, and resources, among others. You can filter the list to search for specific types of activity or download the events as a JSON file for further investigation.

You can browse the audit events and security logs to detect unusual activity or for troubleshooting. If you use external security information and event management software, consider importing the audit events JSON file for automated analysis.

Limit Access to Sensitive Information

If you store sensitive information in your issues, take extra efforts to make sure this data is secure.

  • Use dedicated projects to store issues that contain information that can be used to identify a person.
  • Make sure the users who have access to issues in this project understand the sensitivity of this information.
  • Restrict project access to the users who need to view and use this information.
  • Restrict the visibility of issues and comments to the group of users who have access to the project.

For issues that contain sensitive or confidential information, don't leave anything to chance. If you rely on users to set the visibility manually, someone is bound to forget.

Use workflows to set the visibility for issues and comments according to your security scheme. You can create and attach workflows that support the following common use cases:

  • Set issue visibility automatically when it is created in a project that is used to manage sensitive information.
  • Change visibility when an issue is assigned a specific type or subsystem.
  • Warn users who set the visibility for a comment that is different from the issue visibility.
  • Block users from changing the visibility setting for an issue or comment.

For more information, see Workflows.

Restrict Anonymous Access

By default, all YouTrack instances include a dedicated user account for guests. This user is granted the default Observer role in the Global project. Anyone who knows your instance URL can use the guest account to browse issues in your projects without having to log in.

If you wish to limit or block anonymous access, you have the following options:

  • You can revoke the role that is assigned to the guest account in the Global project. You can then choose whether you want to grant the guest account an Observer role in the projects that you want to make available to the public. We generally discourage granting roles with update permissions to the guest account, as these actions cannot be associated with an individual.
  • You can ban the guest account. All users are required to log in to view issues with a registered account. Access to issues in each project is determined by the roles that are assigned on a per-user or per-group basis.

For more information, see Manage Guest Users.

Protect User Privacy

By default, the Strict Suggestions feature is enabled for your YouTrack InCloud instance. This feature filters the list of users that are suggested for auto-completion based on the permissions that are granted to the current user. This filter is applied to search queries, commands, and @mentions in issue descriptions and comments.

If your YouTrack instance is available to different groups of users who should not be able to see the names and logins of users in other projects, do not disable this feature. For more information, see Strict Suggestions.

Last modified: 17 November 2017