← Back to Nexus

Security

Last updated: April 15, 2026

1. Security Principles

Nexus follows a defense-in-depth approach focused on confidentiality, integrity, and availability of lead, property, and communication data used by internal CRM teams.

2. Access Management

Access is controlled through authenticated accounts, role-based permissions, and organizational boundaries. Privileged operations are restricted to authorized personnel and reviewed as needed.

3. Data Protection

Nexus uses encrypted transport channels and secure storage controls. Sensitive workflows involving email, calendar, and WhatsApp integrations are configured to reduce unauthorized access risk.

4. Monitoring and Logging

Security-relevant events are logged to support monitoring, troubleshooting, and incident investigations. Logs may include login activity, data access patterns, and high-risk configuration changes.

5. Vulnerability Management

Nexus maintains patching and dependency management processes and addresses reported vulnerabilities based on severity, exploitability, and business impact.