About Tettra's security

Below you can find all the information related to Tettra's security. If you want to learn more, send us a note at [email protected]. We’re happy to help in any way we can.

Tettra's security

Backups & data recovery

Everything stored on Tettra is backed up daily. We have tested our recovery procedures, and in the event of a data-loss we are able to restore from backup within an hour. We also allow you to export your Tettra content as HTML at any time, for additional peace of mind.

Encryption in transit and at rest

When using Tettra, all of your data is sent via HTTPS. That means your data (e.g. passwords) is encrypted and can’t be intercepted by hackers. Both our primary database and all backups are encrypted. All communication across data centers is over SSL.


We strive to make Tettra a highly-available service that our customers can rely on. Tettra runs on infrastructure that has fault-tolerance and redundancy built-in. If incidents do arise, we keep our customers informed and work hard to resolve them as quickly as possible. Our current and past availability information is available at http://status.tettra.co/.

Hosting & service providers

We consider security as the primary criterion when choosing service providers to work with. Our providers are SOC 2 certified.


Our credit card processor, Stripe, has been audited by a PCI-certified auditor and is certified to PCI Service Provider Level 1. This is the most stringent level of certification available.


Authentication to Tettra is handled via OAuth to Slack or Google. You can enable 2-factor authentication on your Slack account for an added layer of security.

For accounts set up with email, we verify that email address belongs to you and store your password using the industry recommended hash function (bcrypt).

Access to customer data and audit policies

We have strict policies in place regarding Tettra employee access to data you store on Tettra. From time to time, certain employees may need to access customer data in order to diagnose and resolve issues. Whenever practical, we notify the customer and obtain written consent before doing so. We have granular audit logs in place to ensure that any access to customer data is logged.

Continuous improvement

All new product features and internal processes are peer-reviewed and evaluated for their security impact before they are released to production. We strive to continuously monitor and improve our security practices in response to industry changes and customer feedback.