Trust Center
TerraBog is built with enterprise-grade security controls to protect your data, ensure compliance, and maintain operational reliability. This page describes our security posture in full.
Last reviewed: February 2026 · Questions? security@terrabog.com
Security Principles
TerraBog's security architecture follows a defense-in-depth model with multiple independent controls at every layer.
Compliance & Standards
TerraBog maintains third-party certifications and complies with applicable privacy regulations. Certification documentation is available to enterprise customers under NDA.
Data Protection
Technical specifications for how TerraBog protects data at every layer of the stack.
Infrastructure & Hosting
TerraBog's infrastructure is designed for high availability with no single points of failure and fully automated operational procedures.
TerraBog operates across three AWS regions: us-east-1 (primary), eu-west-1 (EU data residency option), and ap-southeast-1. Traffic is automatically routed to the nearest healthy region.
3
Active Regions
99.99%
Uptime SLA
Full database snapshots run every 6 hours. Incremental backups every 15 minutes. All backups are encrypted, replicated cross-region, and retained for 90 days with point-in-time restore.
15 min
RPO
90 days
Retention
Documented disaster recovery procedures define recovery objectives by incident severity. Cross-region failover is rehearsed quarterly in a dedicated staging environment isolated from production.
4 hours
RTO (P1)
Quarterly
DR Tests
All infrastructure is defined in version-controlled Terraform configurations. Configuration drift is detected in real time. No manual infrastructure changes are permitted in production environments.
100%
IaC Coverage
Automated
Change Control
Access & Identity Controls
TerraBog enforces rigorous access controls from authentication at the perimeter through permissions on individual resources.
Enterprise SSO via SAML 2.0 or OpenID Connect. Pre-built connectors for Okta, Azure Active Directory, and Google Workspace. Available on all Enterprise plans. JIT user provisioning supported.
MFA required for all team member accounts. Supports authenticator apps, SMS, hardware security keys (FIDO2/WebAuthn), and passkeys. Administrators can enforce MFA workspace-wide with no exceptions.
Four built-in roles with distinct, non-overlapping permission boundaries. Custom roles available on Enterprise. All permission changes are logged. Resource-level access grants supported for sensitive data sources.
Sessions expire automatically after 8 hours of inactivity. Administrators can enumerate and terminate active sessions across all devices. Configurable concurrent session limits enforced at workspace level.
Incident Response
All security incidents follow a documented runbook with defined response time objectives at each phase. Customers are kept informed throughout any event that affects their data.
Automated monitoring systems detect anomalies and issue alerts. All alerts are immediately routed to the on-call security engineer via PagerDuty with full context.
On-call engineer triages the alert, determines severity (P1–P4), and activates the appropriate incident response runbook. Initial severity may be upgraded as more information becomes available.
Affected systems are isolated or quarantined. Automated circuit breakers and rollback procedures are engaged to minimize blast radius and prevent further data exposure.
Affected customers notified per contractual and regulatory requirements within 24 hours of a confirmed data breach. Live status updates posted to status.terrabog.com throughout the event.
Full root cause analysis completed and remediation report published within five business days. Findings and preventive measures are reviewed with affected customers upon request.
Responsible Disclosure
If you discover a security vulnerability in TerraBog's products or infrastructure, please report it to security@terrabog.com. We acknowledge all reports within 24 hours and aim to resolve critical issues within 30 days. We do not pursue legal action against good-faith researchers.
Report a vulnerabilitySecurity Documentation
Our security team can provide SOC 2 reports, custom DPAs, penetration test summaries, and architecture documentation to support your vendor assessment process.
Quick Reference