Security
Last updated: April 15, 2026
1. Security Principles
Nexus follows a defense-in-depth approach focused on confidentiality, integrity, and availability of lead, property, and communication data used by internal CRM teams.
2. Access Management
Access is controlled through authenticated accounts, role-based permissions, and organizational boundaries. Privileged operations are restricted to authorized personnel and reviewed as needed.
3. Data Protection
Nexus uses encrypted transport channels and secure storage controls. Sensitive workflows involving email, calendar, and WhatsApp integrations are configured to reduce unauthorized access risk.
4. Monitoring and Logging
Security-relevant events are logged to support monitoring, troubleshooting, and incident investigations. Logs may include login activity, data access patterns, and high-risk configuration changes.
5. Vulnerability Management
Nexus maintains patching and dependency management processes and addresses reported vulnerabilities based on severity, exploitability, and business impact.