Trust & Security
Nexora is designed for teams that require clear controls, strong boundaries, and evidence-grade auditability. This page summarizes how we approach security, privacy, and operational integrity.
Data boundaries and tenant isolation
- Tenant data is logically isolated and access is governed by least-privilege controls.
- Administrative access is restricted and monitored.
- Customer data is never used for unrelated purposes without explicit agreement.
Encryption and transport security
- Encryption in transit is enforced using modern TLS configurations.
- Sensitive secrets are not stored in frontend code or shipped to clients.
Auditability and evidence
- Security-relevant actions are recorded with traceability (who/what, when, what changed, and why when provided).
- Audit views and exports are intended to support investigations and compliance workflows.
Secure development practices
- Code changes are reviewed and tested prior to release.
- Dependencies are monitored and updated to reduce exposure to known vulnerabilities.
- Security issues are triaged and addressed based on severity and exploitability.
SOC 2 and compliance alignment
- Nexora is designed to support SOC 2 readiness and common control frameworks.
- Certification and formal compliance status are available under NDA where applicable.
Responsible disclosure
If you believe you've found a security issue, report it through our Security page. We investigate promptly and coordinate responsibly.