Skip to main content
Last reviewed: March 5, 2026 Owner: Security + Engineering Review cadence: Quarterly Status: In progress This page is written for security reviewers who need fast, concrete answers: what Tero operates, what data is handled, where responsibilities split, and what evidence is available.

What this page answers

  • What is live today versus still in progress
  • What changes between Tero-hosted and self-hosted deployments
  • Where to go next for architecture, ownership, and evidence details

Current state (as of March 5, 2026)

TopicCurrent state
SOC 2 Type IIIn progress (target: March 2026)
EncryptionEnabled in transit and at rest
Deployment modelsTero-hosted and self-hosted
AI provider optionsHosted default provider plus bring-your-own provider options
We prioritize clear, auditable statements over marketing language. If a control is in progress, we mark it as in progress.

Start your review

Deployment boundary at a glance

AreaTero-hostedSelf-hosted
Control plane runtimeOperated by TeroOperated by customer
Network perimeterManaged by Tero baseline controlsManaged by customer
Data locality controlTero-hosted region modelCustomer-chosen region/infrastructure
AI provider pathHosted default and configured optionsCustomer-controlled provider path
Infrastructure patching and operationsTeroCustomer

Default hosted data scope

Data classStoredWhy
Account and workspace configurationYesService configuration and access control
Telemetry metadata (schemas, field types, volume patterns)YesCatalog, analysis, and policy generation
Full raw telemetry contentNo (default model)Source of record remains your observability platform
Authentication metadataYesSession and access control
Billing records (self-service)Limited scope onlyBilling operations

What this means in practice

  • Baseline integration does not require vendor-initiated inbound connectivity into your environment.
  • Full raw telemetry is not the default hosted system-of-record data model.
  • Control ownership shifts materially in self-hosted mode at the infrastructure and network layers.

Evidence path

TopicPublic evidenceAdditional evidence (on request)
Architecture and trust boundariesSecurity ArchitectureArchitecture walkthrough and control notes
Responsibility splitShared ResponsibilityDeployment-specific control allocation review
Encryption controlsEncryption StandardPlatform control evidence and security review package
Subprocessors and data handlingSubprocessors and Third PartiesSubprocessor and data-flow detail under NDA
AI data handling optionsAI Data ControlsDeployment-specific model and provider configuration review

In progress

  • SOC 2 Type II is in progress.
  • Target issuance window: March 2026.

Request security artifacts

Email with your checklist, deployment model, and review timeline.