Teem Trust Center
Overview
Teem is committed to protecting the confidentiality, integrity, and availability of customer data. While Teem has not yet undergone third‑party SOC 2 or ISO 27001 certification audits, we operate in alignment with these frameworks through formally documented policies, secure development practices, continuous monitoring, and incident response procedures.
Information Security Program
Our Information Security Policy defines Teem’s overarching governance structure, responsibilities, and security requirements, ensuring enterprise‑grade protection of information assets. This includes risk management, asset classification, IT asset management, personnel security, incident management, and secure system operations.
Secure Software Development Lifecycle (SDLC)
Teem implements a fully documented SDLC process covering planning, design, secure coding, testing, deployment, and maintenance. Our pipeline includes GitHub‑based version control, static code analysis, vulnerability scanning, code review, separation of environments, automated deployments, and security approvals.
Vulnerability & Threat Management
Continuous scanning is performed across cloud infrastructure, application dependencies, containers, and configurations. We prioritize vulnerabilities using CVSS scoring and remediate them within strict SLAs (Critical: 1 day, High: 7 days, Medium: 30 days). Annual third‑party penetration testing is part of our program.
Access Control & Authentication
Teem enforces role‑based access control, least privilege, MFA, session locking, password standards, account review processes, and automated account termination. Authentication follows NIST 800‑63 guidelines and uses approved token types aligned with AAL1–AAL3 requirements.
Encryption Standards
All data in transit is encrypted using TLS 1.2+ and strong cipher suites. Data at rest is encrypted using FIPS‑validated algorithms (e.g., AES‑128/256). Key management follows strict separation and protection requirements, and full‑disk encryption is required on all laptops accessing Teem systems.
Security Logging & Monitoring
Teem maintains centralized logging across applications, cloud services, authentication events, and network activity. Logs are retained for a minimum of 92 days and protected as high‑confidentiality data. Real‑time alerts detect anomalous activity.
Incident Response
Teem maintains a formal Incident Response Plan based on NIST SP 800‑61. It includes preparation, detection, analysis, containment, eradication, recovery, communications, and post‑incident review. Severity levels drive response time (e.g., High = immediate response).
Business Continuity & Disaster Recovery
Our Business Continuity Plan ensures essential business functions continue during disruptions. It includes Business Impact Analysis, RTO/RPO definitions, communication procedures, recovery steps, annual testing, and training.
HR & Background Checks
All employees and contractors undergo background checks, identity verification, employment checks, and role‑based screening. Re‑screening occurs every three years or upon role changes. Access to sensitive systems is only provisioned after clearance.
Security Awareness & Training
All personnel complete security awareness training within 30 days of hire and annually thereafter. Engineers receive secure coding training, and periodic phishing simulations reinforce learning.
Cloud Infrastructure Security
Teem uses AWS and Vercel for secure, scalable infrastructure. Managed services provide encrypted storage, hardened compute, and secure networking. Deployment assets are isolated, access‑controlled, and continuously monitored.
Compliance Alignment
While Teem is not yet SOC 2 Type II or ISO 27001 certified, our internal policies map to and satisfy their requirements. This includes: SOC 2 (Security, Availability, Processing Integrity), ISO 27001 Annex A controls, and NIST Cybersecurity Framework functions. Our SOC 2 Type II audit is scheduled for 2026.
Responsible Disclosure
Security researchers may report vulnerabilities to security@teem.finance. Teem maintains a Vulnerability Disclosure Program and handles reports promptly.
Contact
For security inquiries: security@teem.finance