Security Overview

We take security very seriously here at Tettra. We know our customers trust us with their team’s important data, and we use industry best practices to keep it secure.

Backups & Data Recovery

Everything stored on Tettra is backed up daily. We have tested our recovery procedures, and in the event of a data-loss we are able to restore from backup within an hour.
We can provide customers with an export of their Tettra content in HTML or markdown format for additional peace of mind.

Encryption In Transit and At Rest

When using Tettra, all of your data is sent via HTTPS. That means your data (e.g. passwords) are encrypted so it can’t be intercepted by hackers. Both our primary database and all backups are encrypted. All communication across data centers is over SSL.

Availability

We strive to make Tettra a highly-available service that our customers can rely on. Tettra runs on infrastructure that has fault-tolerance on and redundancy built in. In the past 12 months, we’ve experienced zero unplanned downtime.

Hosting & Service Providers

We consider security as primary criteria when choosing service providers to work with. Our providers are SOC 2 certified.

Billing

Our credit card processor has been audited by a PCI-certified auditor, and is certified to PCI Service Provider Level 1. This is the most stringent level of certification available.

Authentication

Authentication to Tettra is handled via OAuth to Slack. This means we don’t store your password on our system and you may revoke Tettra’s access to your Slack account at any time. You can enable 2-factor authentication on your Slack account for an added layer of security.

Access to Customer Data and Audit Policies

We have strict policies in place regarding Tettra employee access to data you store on Tettra. From time to time, certain employees may need to access customer data in order to diagnose and resolve issues. Whenever practical, we notify the customer and obtain written consent before doing so. We have granular audit logs in place to ensure that any access to customer data is logged.

Continuous Improvement

All new product features and internal processes are peer-reviewed and evaluated for their security impact before they are released to production. We strive to continuously monitor and improve our security practices in response to industry changes and customer feedback.

Have Concerns?  Want to learn more?

Send us a note at team@tettra.co. We’re happy to help in any way we can.