Skip to main content

How secure is the data Teramind collects and stores in the cloud?

What security measures, including encryption and protocols, does Teramind use to protect the data it collects and stores in the cloud?

Updated over a week ago

Teramind utilizes a robust, layered security approach to protect data in the cloud, covering both data at rest and data in motion.

  • Encryption at Rest: All customer data, account credentials, logs, and backups in persistent storage are protected using strong AES 256-bit encryption.

  • Encryption in Motion: All communication between the Teramind Agent/endpoints and Teramind Server uses our proprietary protocol. Teramind policy enforces that all interaction with its server happen over TLS (for Active Directory LDAP connections) or SSL (for HTTPS) with a 4-key system (private, public, intermediate, root).

  • Access Control: Access to the Cloud production environment is strictly restricted to a minimal number of vetted personnel on a need-to-know basis (Least Privilege). All access is logged and audited. Teramind Support and Customer Success teams have no standing access to customer data. Access is only possible if explicitly granted by the customer (e.g., via a temporary Support PIN), which is also logged.

  • Infrastructure Security: Teramind Cloud is hosted in secure, tier-3 Oracle data centers, which adhere to major security frameworks, including SOC 1, 2, and 3, PCI DSS, ISO/IEC standards (like 27001), GDPR, HIPAA and more. Teramind's own ISO 27001:2022 and SOC 2 Type II certifications demonstrate the implementation of strict administrative and technical safeguards for customer data protection.

Did this answer your question?