Trust, security, and transparency

Enterprise confidence for modern server operations.

Nexus helps teams manage infrastructure through a unified browser-based workspace for SSH, SFTP, file editing, databases, logs, and containers. Our trust center gives customers a clear view into how we protect systems, handle data, and operate reliably.

MFA + RBAC Granular access control and privileged access protection
Encrypted Data protected in transit and at rest
Audit Visibility Operational logging and customer accountability features

Security foundations

We build Nexus around least privilege, layered defense, and operational accountability.

🔐

Access control

Unique identities, role-based access controls, privileged access restrictions, and support for MFA help ensure only authorized users can access systems and workflows.

🧾

Audit logging

Operational events, administrative actions, and platform activity can be logged to improve visibility, support investigations, and strengthen customer accountability.

🔑

Secrets handling

Sensitive credentials and configuration secrets should be stored using secure secrets-management practices and separated from frontend exposure wherever possible.

Compliance posture

Nexus is designed with controls that support modern buyer expectations and enterprise security reviews.

SOC 2 alignment

Nexus is designed in alignment with SOC 2 Trust Services Criteria, with emphasis on security, availability, and confidentiality controls including access control, monitoring, change management, incident response, and data protection.

Security
Availability
Confidentiality
🛡️

Vendor & infrastructure assurance

Core infrastructure should be deployed on established cloud providers and supported by documented vendor review, backup processes, and security configuration standards.

Cloud controls
Change management
Evidence collection

Reliability & operations

Operational maturity matters as much as feature depth. Nexus emphasizes continuity, observability, and recoverability.

📡

Monitoring & alerting

Service health, critical workflows, and infrastructure components should be continuously monitored with alerts routed to responsible operators.

💾

Backup & recovery

Backups, restore validation, and documented recovery procedures help reduce recovery time and support business continuity goals.

🚨

Incident response

Incidents should be identified, contained, remediated, documented, and reviewed through a defined response process with clear escalation paths.

Security documentation

Use these entries as the basis for a gated customer document request workflow.

Security Overview Summary of architecture, controls, monitoring, and security practices.
Request
SOC 2 Readiness Summary Overview of control framework, scoped criteria, and audit preparedness.
Request
Incident Response Policy High-level policy describing detection, containment, remediation, and post-incident review.
Request
Access Control Policy Policy covering identity, role-based access, reviews, and privilege management.
Request
Subprocessor List Vendors and infrastructure partners that support service delivery.
Request

Frequently asked questions

Plain-language answers to the questions enterprise buyers ask most often.

Is Nexus SOC 2 certified?

Nexus can be described as built around SOC 2-aligned controls. Replace this answer with your current status once a formal audit is complete, such as "SOC 2 Type I completed" or "SOC 2 Type II in progress."

How is customer data protected?

Customer data should be protected with encryption in transit, encryption at rest where applicable, controlled access, monitoring, and secure operational processes.

Does Nexus support role-based access control?

Yes. Nexus is positioned around role-based access so organizations can limit user actions based on responsibilities and operational need.

How can we request security documents?

Use the document request area above or direct inquiries to your security contact address. Many teams gate access to deeper documentation behind an NDA or buyer verification workflow.

Need deeper diligence support?

Ready for procurement, legal, and security review.

Nexus can support enterprise evaluations with architecture overviews, policy summaries, questionnaire responses, and trust documentation tailored to your sales process.