Security Overview
Teela is built on the principle that your data is yours. As a multi-tenant SaaS platform that connects to your databases for natural-language analytics, security is foundational to every layer of our architecture. This document provides an overview of Teela's security posture for IT teams and security professionals evaluating the platform.
Access Control
Teela enforces access control at multiple levels: role-based permissions determine what actions a user can perform, connection-level authorization determines what data a user can reach, and authentication controls verify identity through passwords, multi-factor authentication, and API tokens.
Encryption
Teela encrypts sensitive data at rest and in transit using industry-standard algorithms. This page documents the specific cryptographic controls, key management practices, and data exposure policies that protect credentials, metadata, and communications across the platform.
Data Protection
Teela's data protection controls govern how data is classified, handled, stored, and disposed of across the platform. This page covers data classification, the customer data handling model, input validation, privacy compliance, and the application-level security controls that protect data in transit and at rest.