Skip to main content
Last reviewed: March 5, 2026 Owner: Security + Engineering Review cadence: Quarterly Status: Reference Use this page as the intake path for procurement and security review requests.

What this page answers

  • Which artifacts are public versus request-based
  • What to include so review can move quickly
  • How NDA-gated evidence is handled

Available materials

CategoryAvailability
Public Trust Center documentationAvailable now
Security questionnaire responsesAvailable on request
Detailed assurance artifactsAvailable under NDA

Request process

  1. Send your checklist and timeline to .
  2. Include deployment model (Tero-hosted or self-hosted) and any mandatory controls.
  3. We return the relevant package and identify any follow-up items.

Typical request topics

  • Architecture and trust boundaries
  • Identity, authentication, and token controls
  • Encryption and key management
  • Data handling, retention, and subprocessors
  • Compliance milestones and assurance status

Escalations

If your review has a hard procurement deadline, include that date in the request so we can prioritize response sequencing.