Security Overview

We take security very seriously here at Tettra. We know our customers trust us with their team’s important data, and we use industry best practices to keep it secure.

Backups & Data Recovery

Everything stored on Tettra is backed up daily. We have tested our recovery procedures, and in the event of a data-loss we are able to restore from backup within an hour. We also allow you to export your Tettra content as HTML at any time, for additional peace of mind.

Encryption In Transit and At Rest

When using Tettra, all of your data is sent via HTTPS. That means your data (e.g. passwords) are encrypted so it can’t be intercepted by hackers. Both our primary database and all backups are encrypted. All communication across data centers is over SSL.


We strive to make Tettra a highly-available service that our customers can rely on. Tettra runs on infrastructure that has fault-tolerance and redundancy built in. If incidents do arise, we keep our customers informed and work hard to resolve them as quickly as possible. Our current and past availability information is available at

Hosting & Service Providers

We consider security as primary criteria when choosing service providers to work with. Our providers are SOC 2 certified.


Our credit card processor, Stripe, has been audited by a PCI-certified auditor, and is certified to PCI Service Provider Level 1. This is the most stringent level of certification available.


Authentication to Tettra is handled via OAuth to Slack or Google. You can enable 2-factor authentication on your Slack account for an added layer of security.

For accounts set up with email, we verify that email address belongs to you and store your password using the industry recommended hash function (bcrypt).

Access to Customer Data and Audit Policies

We have strict policies in place regarding Tettra employee access to data you store on Tettra. From time to time, certain employees may need to access customer data in order to diagnose and resolve issues. Whenever practical, we notify the customer and obtain written consent before doing so. We have granular audit logs in place to ensure that any access to customer data is logged.

Continuous Improvement

All new product features and internal processes are peer-reviewed and evaluated for their security impact before they are released to production. We strive to continuously monitor and improve our security practices in response to industry changes and customer feedback.

Have Concerns?  Want to learn more?

Send us a note at We’re happy to help in any way we can.

Start building your internal knowledge base today

Fewer repetitive questions for you and faster answers for your team.

We guarantee you’ll be hooked.

Create your knowledge base