{"id":36,"date":"2023-12-12T20:51:15","date_gmt":"2023-12-12T20:51:15","guid":{"rendered":"https:\/\/terrabioappdev.wpenginepowered.com\/?page_id=36"},"modified":"2025-08-06T09:42:23","modified_gmt":"2025-08-06T13:42:23","slug":"terra-security","status":"publish","type":"page","link":"https:\/\/terra.bio\/terra-security\/","title":{"rendered":"Terra Security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"36\" class=\"elementor elementor-36\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b0d6f45 e-flex e-con-boxed e-con e-parent\" data-id=\"b0d6f45\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-41197c0 elementor-widget elementor-widget-heading\" data-id=\"41197c0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Security<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6d6143f e-flex e-con-boxed e-con e-parent\" data-id=\"6d6143f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-9f625cc e-con-full e-flex e-con e-child\" data-id=\"9f625cc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f4ddc74 elementor-widget__width-initial elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"f4ddc74\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;motion_fx_motion_fx_scrolling&quot;:&quot;yes&quot;,&quot;motion_fx_range&quot;:&quot;viewport&quot;,&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;motion_fx_devices&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;]}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The Terra platform and the data it contains is secured according to best practices in information security, suitable for safeguarding human health data.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e64004c elementor-widget elementor-widget-image\" data-id=\"e64004c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"785\" height=\"680\" src=\"https:\/\/terra.bio\/wp-content\/uploads\/2024\/01\/security-icon.png\" class=\"attachment-large size-large wp-image-845\" alt=\"security icon\" srcset=\"https:\/\/terra.bio\/wp-content\/uploads\/2024\/01\/security-icon.png 785w, https:\/\/terra.bio\/wp-content\/uploads\/2024\/01\/security-icon-300x260.png 300w, https:\/\/terra.bio\/wp-content\/uploads\/2024\/01\/security-icon-768x665.png 768w\" sizes=\"(max-width: 785px) 100vw, 785px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-08fc266 e-flex e-con-boxed e-con e-parent\" data-id=\"08fc266\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b9e4036 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"b9e4036\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;motion_fx_motion_fx_scrolling&quot;:&quot;yes&quot;,&quot;motion_fx_range&quot;:&quot;viewport&quot;,&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:250,&quot;motion_fx_devices&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;]}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">We are committed to protecting patient data\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8b21bb9 elementor-widget elementor-widget-text-editor\" data-id=\"8b21bb9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center;\">The Broad Institute, Microsoft, and Verily support the medical research community as it deals with matters of public health. Our security posture addresses the rights of the patients whose data make this work possible, as well as the needs and concerns of the researchers. We work with internal and 3rd party security experts to define the system and security needs of the system, to assess that security controls are implemented, to monitor that controls continue to be effective, and to respond appropriately to incidents or anomalies.<\/p><p style=\"text-align: center;\"><br \/><a style=\"color: #fff;\" href=\"https:\/\/support.terra.bio\/hc\/en-us\/articles\/360030793091\" target=\"_blank\" rel=\"noopener external\" data-wpel-link=\"external\"><u>View the full text of our security posture<\/u><\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2d9f874 e-flex e-con-boxed e-con e-parent\" data-id=\"2d9f874\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-72c1172 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"72c1172\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;motion_fx_motion_fx_scrolling&quot;:&quot;yes&quot;,&quot;motion_fx_range&quot;:&quot;viewport&quot;,&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:250,&quot;motion_fx_devices&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;]}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Compliance certifications and memberships\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8f4fbfa elementor-widget elementor-widget-text-editor\" data-id=\"8f4fbfa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center;\">We use best practices and industry standards, mostly aligned to NIST-800-53 Rev 5 Moderate, to achieve compliance with industry-accepted general security and privacy frameworks, which in turn helps our users meet their own compliance standards.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-af9ec8e animated-slow e-flex e-con-boxed elementor-invisible e-con e-child\" data-id=\"af9ec8e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;motion_fx_motion_fx_scrolling&quot;:&quot;yes&quot;,&quot;motion_fx_range&quot;:&quot;viewport&quot;,&quot;animation_delay&quot;:200,&quot;motion_fx_devices&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;]}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-3a189b2 homebox  e-flex e-con-boxed e-con e-child\" data-id=\"3a189b2\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b12dec0 elementor-widget elementor-widget-image\" data-id=\"b12dec0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"396\" height=\"160\" src=\"https:\/\/terra.bio\/wp-content\/uploads\/2023\/12\/FISMA1.png\" class=\"attachment-large size-large wp-image-768\" alt=\"FISMA1\" srcset=\"https:\/\/terra.bio\/wp-content\/uploads\/2023\/12\/FISMA1.png 396w, https:\/\/terra.bio\/wp-content\/uploads\/2023\/12\/FISMA1-300x121.png 300w\" sizes=\"(max-width: 396px) 100vw, 396px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fedbb4e elementor-widget elementor-widget-heading\" data-id=\"fedbb4e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">FISMA<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1e563ea bluelink elementor-widget elementor-widget-text-editor\" data-id=\"1e563ea\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center;\">The Terra system has been granted Authority to Operate as a FISMA Moderate impact system.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c07d0e2 homebox  e-flex e-con-boxed e-con e-child\" data-id=\"c07d0e2\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bdeb836 elementor-widget elementor-widget-image\" data-id=\"bdeb836\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"225\" height=\"225\" src=\"https:\/\/terra.bio\/wp-content\/uploads\/2024\/01\/fedramp.jpg\" class=\"attachment-large size-large wp-image-846\" alt=\"fedramp\" srcset=\"https:\/\/terra.bio\/wp-content\/uploads\/2024\/01\/fedramp.jpg 225w, https:\/\/terra.bio\/wp-content\/uploads\/2024\/01\/fedramp-150x150.jpg 150w\" sizes=\"(max-width: 225px) 100vw, 225px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9919b9c elementor-widget elementor-widget-heading\" data-id=\"9919b9c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">FedRAMP<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d3af1be bluelink elementor-widget elementor-widget-text-editor\" data-id=\"d3af1be\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center;\">Terra is FedRAMP authorized as a Moderate Impact system with an Agency Authorization. You can find Terra listed in the FedRAMP Marketplace.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1ed907e animated-slow e-flex e-con-boxed elementor-invisible e-con e-parent\" data-id=\"1ed907e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;motion_fx_motion_fx_scrolling&quot;:&quot;yes&quot;,&quot;motion_fx_range&quot;:&quot;viewport&quot;,&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:200,&quot;motion_fx_devices&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;]}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b454683 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"b454683\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;motion_fx_motion_fx_scrolling&quot;:&quot;yes&quot;,&quot;motion_fx_range&quot;:&quot;viewport&quot;,&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:250,&quot;motion_fx_devices&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;]}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">We adhere to information security best practices\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b08afd8 elementor-widget elementor-widget-text-editor\" data-id=\"b08afd8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center;\">All systems undergo continual threat assessment and detection.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d128e5a animated-slow e-flex e-con-boxed elementor-invisible e-con e-child\" data-id=\"d128e5a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;motion_fx_motion_fx_scrolling&quot;:&quot;yes&quot;,&quot;motion_fx_range&quot;:&quot;viewport&quot;,&quot;animation_delay&quot;:200,&quot;motion_fx_devices&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;]}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-81520bc homebox  e-flex e-con-boxed e-con e-child\" data-id=\"81520bc\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9da5cb9 elementor-widget elementor-widget-image\" data-id=\"9da5cb9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"156\" height=\"84\" src=\"https:\/\/terra.bio\/wp-content\/uploads\/2023\/12\/trusted-enforced.svg\" class=\"attachment-large size-large wp-image-122\" alt=\"trusted enforced\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0ce9982 elementor-widget elementor-widget-heading\" data-id=\"0ce9982\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Authenticate<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-af8a747 bluelink elementor-widget elementor-widget-text-editor\" data-id=\"af8a747\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center;\">All components require authentication at every step, not just the perimeter<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-55ab933 homebox  e-flex e-con-boxed e-con e-child\" data-id=\"55ab933\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-44f073c elementor-widget elementor-widget-image\" data-id=\"44f073c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"341\" height=\"303\" src=\"https:\/\/terra.bio\/wp-content\/uploads\/2024\/01\/audit.png\" class=\"attachment-large size-large wp-image-848\" alt=\"audit\" srcset=\"https:\/\/terra.bio\/wp-content\/uploads\/2024\/01\/audit.png 341w, https:\/\/terra.bio\/wp-content\/uploads\/2024\/01\/audit-300x267.png 300w\" sizes=\"(max-width: 341px) 100vw, 341px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-10b8400 elementor-widget elementor-widget-heading\" data-id=\"10b8400\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Audit<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aa33c7f bluelink elementor-widget elementor-widget-text-editor\" data-id=\"aa33c7f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center;\">All data access is logged (to a different system), with alerts for anomalous events<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-54167be homebox  e-flex e-con-boxed e-con e-child\" data-id=\"54167be\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cf0d066 elementor-widget elementor-widget-image\" data-id=\"cf0d066\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"113\" height=\"97\" src=\"https:\/\/terra.bio\/wp-content\/uploads\/2023\/12\/analysis-bring.svg\" class=\"attachment-large size-large wp-image-111\" alt=\"analysis bring\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d7086c9 elementor-widget elementor-widget-heading\" data-id=\"d7086c9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Encrypt<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3c7e724 bluelink elementor-widget elementor-widget-text-editor\" data-id=\"3c7e724\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center;\">All data-in-transit and all data-at-rest is encrypted<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f9d8de2 e-flex e-con-boxed e-con e-parent\" data-id=\"f9d8de2\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-39f3d24 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"39f3d24\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;motion_fx_motion_fx_scrolling&quot;:&quot;yes&quot;,&quot;motion_fx_range&quot;:&quot;viewport&quot;,&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:250,&quot;motion_fx_devices&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;]}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Full summary of our security approach\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-04837d8 elementor-widget elementor-widget-text-editor\" data-id=\"04837d8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center;\">We implement the core data security functions of Identify, Protect, Detect, Respond, and Recover at all times, and we maintain a posture of continual assessment through a variety of security automation in the \u201cDevSecOps\u201d mode of operation.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b960989 bluelink elementor-widget elementor-widget-text-editor\" data-id=\"b960989\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-25cadff elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"25cadff\" data-element_type=\"section\">\n<div class=\"elementor-container elementor-column-gap-default\">\n<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-d6fcf6c\" data-id=\"d6fcf6c\" data-element_type=\"column\">\n<div class=\"elementor-widget-wrap elementor-element-populated\">\n<div class=\"elementor-element elementor-element-40dd3b6 elementor-widget elementor-widget-text-editor\" data-id=\"40dd3b6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n<div class=\"elementor-widget-container\">\n<p>Terra leverages&nbsp;<a href=\"https:\/\/cloud.google.com\/security\" target=\"_blank\" rel=\"noopener external\" data-wpel-link=\"external\">Google Cloud Platform<\/a>&nbsp;and&nbsp;<a href=\"https:\/\/azure.microsoft.com\/en-us\/explore\/security\/\" target=\"_blank\" rel=\"noopener external\" data-wpel-link=\"external\">Microsoft Azure Commercial Cloud<\/a>&nbsp;as our cloud service providers, both of which have extensive compliance certifications and physical security.&nbsp;<b>Though Terra services are available on both cloud platforms, only Terra services hosted on Google Cloud Platform are FedRAMP authorized at this time. Terra services hosted on Microsoft Azure will be FedRAMP authorized in the near future.<\/b><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-90273d6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"90273d6\" data-element_type=\"section\">\n<div class=\"elementor-container elementor-column-gap-default\">\n<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-976e239\" data-id=\"976e239\" data-element_type=\"column\">\n<div class=\"elementor-widget-wrap elementor-element-populated\">\n<div class=\"elementor-element elementor-element-287a507 elementor-widget elementor-widget-heading\" data-id=\"287a507\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Infrastructure Security<\/h3><div><b style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-size: var( --e-global-typography-text-font-size ); text-align: var(--text-align);\">Dedicated Security Team<br><\/b><span style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-size: var( --e-global-typography-text-font-size ); font-weight: var( --e-global-typography-text-font-weight ); text-align: var(--text-align);\">Our Security Team is on call 24\/7 to respond to security alerts and events.<\/span><\/div><div><span style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-size: var( --e-global-typography-text-font-size ); font-weight: var( --e-global-typography-text-font-weight ); text-align: var(--text-align);\"><br><\/span><\/div><\/div><\/div>\n<div class=\"elementor-element elementor-element-f2df6ce elementor-widget elementor-widget-text-editor\" data-id=\"f2df6ce\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n<div class=\"elementor-widget-container\">\n<p><b>Network Protection<\/b><br>Our network is protected through the use of key cloud service provider security services, regular internal assessment and external audits, threat intelligence technologies, which monitor and\/or block known malicious traffic and network attacks.<\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-34c542b elementor-widget elementor-widget-text-editor\" data-id=\"34c542b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n<div class=\"elementor-widget-container\">\n<p><b>Architecture<\/b><br>Our network security architecture relies on the built-in logical separation of our cloud services providers. Little of our infrastructure is exposed to the Internet. We utilize GCP\u2019s Load Balancers with CloudArmor and Azure\u2019s Load Balancers with Azure Web Application Firewall. We use kubernetes infrastructure to minimize VM and network exposure and rely on GCP and Azure\u2019s own threat detection to keep those safe.<\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-a44bb64 elementor-widget elementor-widget-text-editor\" data-id=\"a44bb64\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n<div class=\"elementor-widget-container\">\n<p><b>Third-Party Penetration Tests<\/b><br>In addition to our extensive internal scanning and testing program, each year, Terra employs third-party security experts to perform a broad penetration test.<\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-78842d2 elementor-widget elementor-widget-text-editor\" data-id=\"78842d2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n<div class=\"elementor-widget-container\">\n<p><b>Security Incident Event Management<\/b><br>Our Security Incident Event Management (SIEM) system gathers extensive logs from important network devices and host systems. The SIEM alerts on triggers that notify the Security team based on correlated events for investigation and response.<\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-35d508b elementor-widget elementor-widget-text-editor\" data-id=\"35d508b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n<div class=\"elementor-widget-container\">\n<p><b>Intrusion Detection and Prevention<\/b><br>Service ingress and egress points are instrumented and monitored to detect anomalous behavior. These systems are configured to generate alerts when incidents and values exceed predetermined thresholds and use regularly updated signatures based on new threats. This includes 24\/7 system monitoring.<\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-5bdc1f7 elementor-widget elementor-widget-text-editor\" data-id=\"5bdc1f7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n<div class=\"elementor-widget-container\">\n<p><b>Threat Intelligence Program<br><\/b>Terra participates in several threat intelligence sharing programs. We monitor threats posted to these threat intelligence networks and take action based on risk.<\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-b6d681d elementor-widget elementor-widget-text-editor\" data-id=\"b6d681d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n<div class=\"elementor-widget-container\">\n<p><b>Security Incident Response<\/b><br>In case of a system alert, events are escalated to our 24\/7 teams providing Operations coverage. Employees are trained on security incident response processes, including communication channels and escalation paths.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-9557cb9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9557cb9\" data-element_type=\"section\">\n<div class=\"elementor-container elementor-column-gap-default\">\n<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-23f390b\" data-id=\"23f390b\" data-element_type=\"column\">\n<div class=\"elementor-widget-wrap elementor-element-populated\">\n<div class=\"elementor-element elementor-element-ccf2aef elementor-widget elementor-widget-heading\" data-id=\"ccf2aef\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Encryption<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-7adb8f2 elementor-widget elementor-widget-text-editor\" data-id=\"7adb8f2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n<div class=\"elementor-widget-container\">\n<p><b>Encryption in Transit<\/b><br>All communications with Terra UI and APIs are encrypted via industry standard HTTPS\/TLS (TLS 1.2 or higher) over public and private networks.<\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-a376962 elementor-widget elementor-widget-text-editor\" data-id=\"a376962\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n<div class=\"elementor-widget-container\">\n<p><b>Encryption at Rest<\/b><br>Service Data is encrypted at rest, by default, in GCP and in Azure using FIPS 140-2 validated encryption. Additional options for Customer Controlled encryption might be available depending on a variety of circumstances.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-cef5094 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cef5094\" data-element_type=\"section\">\n<div class=\"elementor-container elementor-column-gap-default\">\n<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-150c3bb\" data-id=\"150c3bb\" data-element_type=\"column\">\n<div class=\"elementor-widget-wrap elementor-element-populated\">\n<div class=\"elementor-element elementor-element-d410881 elementor-widget elementor-widget-heading\" data-id=\"d410881\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Availability<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-252203c elementor-widget elementor-widget-text-editor\" data-id=\"252203c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n<div class=\"elementor-widget-container\">\n<p><b>Disaster Recovery<\/b><br>Our Disaster Recovery (DR) program ensures that our services remain available and are easily recoverable in the case of a disaster. This is accomplished through building a robust technical environment, creating Disaster Recovery plans, and testing activities.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-e2d4803 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e2d4803\" data-element_type=\"section\">\n<div class=\"elementor-container elementor-column-gap-default\">\n<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-119acc5\" data-id=\"119acc5\" data-element_type=\"column\">\n<div class=\"elementor-widget-wrap elementor-element-populated\">\n<div class=\"elementor-element elementor-element-91bf38c elementor-widget elementor-widget-heading\" data-id=\"91bf38c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Application Security<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-58ba11b elementor-widget elementor-widget-text-editor\" data-id=\"58ba11b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n<div class=\"elementor-widget-container\">\n<p><b>Secure development (SDLC)<\/b><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-d1b4682 elementor-widget elementor-widget-text-editor\" data-id=\"d1b4682\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n<div class=\"elementor-widget-container\">\n<p><b>Secure Code Training<\/b><br>At least annually, engineers participate in secure code training covering OWASP Top 10 security risks, common attack vectors, and Terra security controls.<\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-95cce3f elementor-widget elementor-widget-text-editor\" data-id=\"95cce3f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n<div class=\"elementor-widget-container\">\n<p><b>Framework Security Controls<\/b><br>Terra leverages modern and secure open-source frameworks with security controls to limit exposure to&nbsp;<a href=\"https:\/\/owasp.org\/www-project-top-ten\/\" target=\"_blank\" rel=\"noopener external\" data-wpel-link=\"external\">OWASP Top 10<\/a>&nbsp;security risks. These inherent controls reduce our exposure to SQL Injection (SQLi), Cross Site Scripting (XSS), and Cross Site Request Forgery (CSRF), among others.<\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-fba6e2b elementor-widget elementor-widget-text-editor\" data-id=\"fba6e2b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n<div class=\"elementor-widget-container\">\n<p><b>Quality Assurance<\/b><br>All code is reviewed by humans with machine assistance. All code is tested with unit and integration tests. Dedicated application security engineers on staff identify, test, and triage security vulnerabilities based on threat models.<\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-75204e0 elementor-widget elementor-widget-text-editor\" data-id=\"75204e0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n<div class=\"elementor-widget-container\">\n<p><b>Separate Environments<\/b><br>Testing and staging environments are physically separated from the Production environment (different GCP Orgs). No Service Data is used in our development or test environments.<\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-9158300 elementor-widget elementor-widget-text-editor\" data-id=\"9158300\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n<div class=\"elementor-widget-container\">\n<p><b>Vulnerability Management<\/b><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-962d1bc elementor-widget elementor-widget-text-editor\" data-id=\"962d1bc\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n<div class=\"elementor-widget-container\">\n<p><b>Dynamic Vulnerability Scanning<\/b><br>We employ third-party security tooling to continuously and dynamically scan our core applications against the OWASP Top 10 security risks. We maintain a dedicated in-house product security team to test and work with engineering teams to remediate any discovered issues.<\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-146fbc4 elementor-widget elementor-widget-text-editor\" data-id=\"146fbc4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n<div class=\"elementor-widget-container\">\n<p><b>Static Code Analysis<\/b><br>The source code repositories for both our platform and mobile applications are scanned for security issues via our integrated static analysis tooling.<\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-ce0b57d elementor-widget elementor-widget-text-editor\" data-id=\"ce0b57d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n<div class=\"elementor-widget-container\">\n<p><b>Dependency Analysis<\/b><br>All source code dependencies are scanned for known vulnerabilities, including THEIR dependencies.<\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-adecb81 elementor-widget elementor-widget-text-editor\" data-id=\"adecb81\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n<div class=\"elementor-widget-container\">\n<p><b>Third-Party Penetration Testing<\/b><br>In addition to our extensive internal scanning and testing program, Terra employs third-party security experts to perform detailed penetration tests on different applications within our family of products.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Security The Terra platform and the data it contains is secured according to best practices in information security, suitable for safeguarding human health data. We are committed to protecting patient data The Broad Institute, Microsoft, and Verily support the medical research community as it deals with matters of public health. Our security posture addresses the [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-36","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Terra Security - Terra<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/terra.bio\/terra-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Terra Security - Terra\" \/>\n<meta property=\"og:description\" content=\"Security The Terra platform and the data it contains is secured according to best practices in information security, suitable for safeguarding human health data. We are committed to protecting patient data The Broad Institute, Microsoft, and Verily support the medical research community as it deals with matters of public health. Our security posture addresses the [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/terra.bio\/terra-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Terra\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-06T13:42:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/terra.bio\/wp-content\/uploads\/2024\/01\/security-icon.png\" \/>\n\t<meta property=\"og:image:width\" content=\"785\" \/>\n\t<meta property=\"og:image:height\" content=\"680\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/terra.bio\/terra-security\/\",\"url\":\"https:\/\/terra.bio\/terra-security\/\",\"name\":\"Terra Security - Terra\",\"isPartOf\":{\"@id\":\"https:\/\/terra.bio\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/terra.bio\/terra-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/terra.bio\/terra-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/terra.bio\/wp-content\/uploads\/2024\/01\/security-icon.png\",\"datePublished\":\"2023-12-12T20:51:15+00:00\",\"dateModified\":\"2025-08-06T13:42:23+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/terra.bio\/terra-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/terra.bio\/terra-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/terra.bio\/terra-security\/#primaryimage\",\"url\":\"https:\/\/terra.bio\/wp-content\/uploads\/2024\/01\/security-icon.png\",\"contentUrl\":\"https:\/\/terra.bio\/wp-content\/uploads\/2024\/01\/security-icon.png\",\"width\":785,\"height\":680,\"caption\":\"security icon\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/terra.bio\/terra-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/terra.bio\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Terra Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/terra.bio\/#website\",\"url\":\"https:\/\/terra.bio\/\",\"name\":\"Terra\",\"description\":\"Science at Scale\",\"publisher\":{\"@id\":\"https:\/\/terra.bio\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/terra.bio\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/terra.bio\/#organization\",\"name\":\"Terra\",\"url\":\"https:\/\/terra.bio\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/terra.bio\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/terra.bio\/wp-content\/uploads\/2023\/12\/Terra-Bio-App@2x.webp\",\"contentUrl\":\"https:\/\/terra.bio\/wp-content\/uploads\/2023\/12\/Terra-Bio-App@2x.webp\",\"width\":287,\"height\":318,\"caption\":\"Terra\"},\"image\":{\"@id\":\"https:\/\/terra.bio\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Terra Security - Terra","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/terra.bio\/terra-security\/","og_locale":"en_US","og_type":"article","og_title":"Terra Security - Terra","og_description":"Security The Terra platform and the data it contains is secured according to best practices in information security, suitable for safeguarding human health data. We are committed to protecting patient data The Broad Institute, Microsoft, and Verily support the medical research community as it deals with matters of public health. Our security posture addresses the [&hellip;]","og_url":"https:\/\/terra.bio\/terra-security\/","og_site_name":"Terra","article_modified_time":"2025-08-06T13:42:23+00:00","og_image":[{"width":785,"height":680,"url":"https:\/\/terra.bio\/wp-content\/uploads\/2024\/01\/security-icon.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/terra.bio\/terra-security\/","url":"https:\/\/terra.bio\/terra-security\/","name":"Terra Security - Terra","isPartOf":{"@id":"https:\/\/terra.bio\/#website"},"primaryImageOfPage":{"@id":"https:\/\/terra.bio\/terra-security\/#primaryimage"},"image":{"@id":"https:\/\/terra.bio\/terra-security\/#primaryimage"},"thumbnailUrl":"https:\/\/terra.bio\/wp-content\/uploads\/2024\/01\/security-icon.png","datePublished":"2023-12-12T20:51:15+00:00","dateModified":"2025-08-06T13:42:23+00:00","breadcrumb":{"@id":"https:\/\/terra.bio\/terra-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/terra.bio\/terra-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/terra.bio\/terra-security\/#primaryimage","url":"https:\/\/terra.bio\/wp-content\/uploads\/2024\/01\/security-icon.png","contentUrl":"https:\/\/terra.bio\/wp-content\/uploads\/2024\/01\/security-icon.png","width":785,"height":680,"caption":"security icon"},{"@type":"BreadcrumbList","@id":"https:\/\/terra.bio\/terra-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/terra.bio\/"},{"@type":"ListItem","position":2,"name":"Terra Security"}]},{"@type":"WebSite","@id":"https:\/\/terra.bio\/#website","url":"https:\/\/terra.bio\/","name":"Terra","description":"Science at Scale","publisher":{"@id":"https:\/\/terra.bio\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/terra.bio\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/terra.bio\/#organization","name":"Terra","url":"https:\/\/terra.bio\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/terra.bio\/#\/schema\/logo\/image\/","url":"https:\/\/terra.bio\/wp-content\/uploads\/2023\/12\/Terra-Bio-App@2x.webp","contentUrl":"https:\/\/terra.bio\/wp-content\/uploads\/2023\/12\/Terra-Bio-App@2x.webp","width":287,"height":318,"caption":"Terra"},"image":{"@id":"https:\/\/terra.bio\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/terra.bio\/wp-json\/wp\/v2\/pages\/36","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/terra.bio\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/terra.bio\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/terra.bio\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/terra.bio\/wp-json\/wp\/v2\/comments?post=36"}],"version-history":[{"count":0,"href":"https:\/\/terra.bio\/wp-json\/wp\/v2\/pages\/36\/revisions"}],"wp:attachment":[{"href":"https:\/\/terra.bio\/wp-json\/wp\/v2\/media?parent=36"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}