Security Scanner View
Security Scanner View (PII & DLP) helps teams detect sensitive data in Jira work items and their change history. It scans current content and past changes to highlight potential risks in one clear view.
.webp?inst-v=72f9cf44-ed5a-48e3-abf6-ce78879dd617)
This makes it easier for companies to reduce data exposure, stay compliant, and keep control over sensitive information stored in Jira.
Note: Security Scanner View is available during the trial period and included in the Advanced plan of Issue History for Jira app. After the trial ends, it is available only in the Advanced plan.
You can try the Advanced plan for 30 days free or upgrade at any time.
Sensitive Data Types and Severity Levels
Security Scanner View (PII & DLP) automatically scans Jira work items to find sensitive data, including:
Data type | Severity | Score |
|---|---|---|
Password | ๐ด๐ด๐ด๐ด๐ด | 5 (Critical) |
Credentials | ๐ด๐ด๐ด๐ด๐ด | 5 (Critical) |
Credit Card | ๐ด๐ด๐ด๐ด๐ด | 5 (Critical) |
Social Security Number | ๐ด๐ด๐ด๐ด๐ด | 5 (Critical) |
Document ID | ๐ด๐ด๐ด๐ด๐ด | 5 (Critical) |
AWS Client ID | ๐ด๐ด๐ด๐ด๐ด | 5 (Critical) |
AWS MWS Key | ๐ด๐ด๐ด๐ด๐ด | 5 (Critical) |
AWS Secret Access Key | ๐ด๐ด๐ด๐ด๐ด | 5 (Critical) |
Google API Key | ๐ด๐ด๐ด๐ด๐ด | 5 (Critical) |
Google OAuth Client ID | ๐ด๐ด๐ด๐ด๐ด | 5 (Critical) |
Google OAuth Access Token | ๐ด๐ด๐ด๐ด๐ด | 5 (Critical) |
GitHub Token | ๐ด๐ด๐ด๐ด๐ด | 5 (Critical) |
Generic API Key | ๐ด๐ด๐ด๐ด๐ด | 5 (Critical) |
Generic Secret | ๐ด๐ด๐ด๐ด๐ด | 5 (Critical) |
Stripe API Key | ๐ด๐ด๐ด๐ด๐ด | 5 (Critical) |
SendGrid API Key | ๐ด๐ด๐ด๐ด๐ด | 5 (Critical) |
Slack Token | ๐ด๐ด๐ด๐ด๐ด | 5 (Critical) |
Slack Webhook URL | ๐ด๐ด๐ด๐ด๐ด | 5 (Critical) |
Azure Storage Access Key | ๐ด๐ด๐ด๐ด๐ด | 5 (Critical) |
Mailgun API Key | ๐ด๐ด๐ด๐ด๐ด | 5 (Critical) |
Mailchimp API Key | ๐ด๐ด๐ด๐ด๐ด | 5 (Critical) |
Shopify Secrets | ๐ด๐ด๐ด๐ด๐ด | 5 (Critical) |
Shopify Partner API Access Token | ๐ด๐ด๐ด๐ด๐ด | 5 (Critical) |
Square Access Token | ๐ด๐ด๐ด๐ด๐ด | 5 (Critical) |
Square OAuth Secret | ๐ด๐ด๐ด๐ด๐ด | 5 (Critical) |
SSH Private Key | ๐ด๐ด๐ด๐ด๐ด | 5 (Critical) |
SSH Public Key | ๐ด๐ด๐ด๐ด๐ด | 5 (Critical) |
RSA Private Key | ๐ด๐ด๐ด๐ด๐ด | 5 (Critical) |
PKCS8 Private Key | ๐ด๐ด๐ด๐ด๐ด | 5 (Critical) |
PGP Private Key | ๐ด๐ด๐ด๐ด๐ด | 5 (Critical) |
EC Private Key | ๐ด๐ด๐ด๐ด๐ด | 5 (Critical) |
Password in URL | ๐ด๐ด๐ด๐ด๐ด | 5 (Critical) |
Phone Number | ๐ด๐ด๐ด๐ด | 4 (High) |
Email Address | ๐ก๐ก๐ก | 3 (Medium) |
IP Address | ๐ก๐ก๐ก | 3 (Medium) |
Physical Address | ๐ก๐ก๐ก | 3 (Medium) |
Username / Login | ๐ก๐ก | 2 (Low) |
ZIP Code | ๐ก | 1 (Minimal) |
Detected findings are displayed in a structured table, making it easy to review and prioritize work items that need attention.
How does it work?
Open the app in Jira and go to Security Scanner View.
Select what to scan using filters. You can filter work items by space, sprint, JQL, and more.
Set the date range to specify the time period to scan (current content and history within that range).
Review the generated report. It shows work items (Jira work items where sensitive data was detected), type of finding (category of detected sensitive data (for example, password or API key), security finding (detected sensitive data), severity score (indicates how much attention the finding may need).

Security Scanner View helps users quickly see where sensitive data appears in Jira work items and their history. Instead of manually checking work items one by one, you can get a clear list of findings in one place.
Historical finding (not present in the current state of work item)
Historical mark in the Field column indicates that the security finding is no longer present in the current content. It means sensitive data (such as a password, API key, or card number) appeared in a past change, for example, in an earlier comment or description, and was later removed or updated.

Why this matters:
Sensitive data may still exist in the work item history.
Historical exposure can be relevant for audits and compliance.
Teams can identify and address past data risks, not just current ones.
Who can access the Security Scanner View?
Access to the Security Scanner View is controlled at the group level in the appโs Permissions settings.
Admins can define which user groups are allowed to view Security Scanner results and access sensitive data detection (PII & DLP findings)
Permissions are configured per group via checkboxes in the appโs Permissions page:
Open the app, click the More (โฎ) menu in the top-right corner, and select Permissions.
.png?inst-v=72f9cf44-ed5a-48e3-abf6-ce78879dd617)
Locate the Security Scanner column, select the groups that should have access, and click Save changes.
.png?inst-v=72f9cf44-ed5a-48e3-abf6-ce78879dd617)
Only selected groups will be able to use the Security Scanner View.
Questions & Answers
Haven't used Issue History for Jira app yet? ๐ Then youโre welcome to try it ๐
.png?inst-v=72f9cf44-ed5a-48e3-abf6-ce78879dd617)