What this page answers
- Which artifacts are public versus request-based
- What to include so review can move quickly
- How NDA-gated evidence is handled
Available materials
| Category | Availability |
|---|---|
| Public Trust Center documentation | Available now |
| Security questionnaire responses | Available on request |
| Detailed assurance artifacts | Available under NDA |
Request process
- Send your checklist and timeline to .
- Include deployment model (
Tero-hostedorself-hosted) and any mandatory controls. - We return the relevant package and identify any follow-up items.
Typical request topics
- Architecture and trust boundaries
- Identity, authentication, and token controls
- Encryption and key management
- Data handling, retention, and subprocessors
- Compliance milestones and assurance status