Skip to main content
Last reviewed: March 5, 2026 Owner: Security + Engineering Review cadence: Quarterly Status: Implemented This page describes how incidents are detected, triaged, communicated, and followed through to corrective action.

What this page answers

  • How Tero responds to security-relevant incidents
  • What customers can expect for communication during material incidents
  • How resilience controls support recovery and continuity

Current state (as of March 5, 2026)

Security and operational events, including cloud security alerts, are monitored, triaged, and handled through incident-response workflows.

Incident-response lifecycle

PhaseExpected behavior
DetectionSecurity-relevant signals are monitored and investigated
TriageSeverity and impact are assessed quickly
Containment and recoveryContainment and service-restoration actions are executed
CommunicationAffected customers are notified for material incidents
Post-incident follow-throughCorrective actions and improvements are tracked

Customer communication baseline

  • Material customer-impacting incidents are communicated promptly.
  • Communication includes impact scope, current status, and next steps.
  • Ongoing updates continue until customer-impacting risk is resolved.

Resilience controls

AreaApproach
Cloud security alertingProvider and platform security alerts are monitored and triaged through incident workflows
BackupsEncrypted backups with retention controls
RecoveryOperational recovery procedures and runbooks
Deployment resilienceManaged cloud service patterns and operational controls

Hosted vs self-hosted boundary

AreaTero-hostedSelf-hosted
Product incident supportTeroTero
Infrastructure incident ownershipTeroCustomer
Runtime recovery executionTeroCustomer

Evidence you can request

TopicPrimary evidence
Architecture and monitoring controlsSecurity Architecture
Data durability and retention behaviorData Handling, Data Retention
Assurance postureCompliance and Assurance

Exceptions and governance

Any incident-handling exception requires explicit risk acceptance and time-bound remediation. Evidence requests: