[av_section min_height=” min_height_pc=’25’ min_height_px=’500px’ padding=’default’ custom_margin=’0px’ custom_margin_sync=’true’ color=’main_color’ background=’bg_color’ custom_bg=’#0a0a0a’ background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” attachment=” attachment_size=” attach=’scroll’ position=’top left’ repeat=’no-repeat’ video=” video_ratio=’16:9′ overlay_opacity=’0.5′ overlay_color=” overlay_pattern=” overlay_custom_pattern=” shadow=’no-border-styling’ bottom_border=’no-border-styling’ bottom_border_diagonal_color=’#333333′ bottom_border_diagonal_direction=” bottom_border_style=” custom_arrow_bg=” id=” custom_class=” aria_label=” av_element_hidden_in_editor=’0′ av_uid=’av-k8rmskqc’]

[av_heading heading=’Security Overview’ tag=’h2′ style=’blockquote modern-quote modern-centered’ subheading_active=” size=” av-medium-font-size-title=” av-small-font-size-title=” av-mini-font-size-title=” subheading_size=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” color=’custom-color-heading’ custom_font=’#ffffff’ margin=” margin_sync=’true’ padding=’10’ link=” link_target=” id=” custom_class=” av_uid=’av-k8rmuish’ admin_preview_bg=’rgb(34, 34, 34)’][/av_heading]

[/av_section][av_one_half first min_height=” vertical_alignment=” space=” row_boxshadow=” row_boxshadow_color=” row_boxshadow_width=’10’ custom_margin=” margin=’0px’ mobile_breaking=” border=” border_color=” radius=’0px’ padding=’0px’ column_boxshadow=” column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” background_position=’top left’ background_repeat=’no-repeat’ highlight=” highlight_size=” animation=” link=” linktarget=” link_hover=” title_attr=” alt_attr=” mobile_display=” id=” custom_class=” aria_label=” av_uid=’av-492xsc’]

[av_textblock size=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” font_color=” color=” id=” custom_class=” av_uid=’av-k8ix7wly’ admin_preview_bg=”]

Introduction

[/av_textblock]

[av_textblock size=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” font_color=” color=” id=” custom_class=” av_uid=’av-k8ix6z35′ admin_preview_bg=”]
At Nucleus we believe in strong and accurate security measures. Due to our founders’ backgrounds working in vulnerability management for large data-sensitive organization, security is a priority for the Nucleus team. We thought it would be irresponsible to build an insecure security product which is meant to help make the lives of security practitioners easier.
[/av_textblock]

[av_textblock size=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” font_color=” color=” id=” custom_class=” av_uid=’av-k8ix7ikg’ admin_preview_bg=”]
We understand how important it is for our customers to trust our services and are committed to transparency in the controls we use to secure our entire infrastructure. To achieve the highest levels of security, we utilize a variety of tools, processes, and technologies to help control the environment. At the center of everything, we utilize Nucleus to help us manage our workflows and analysis, and due to this we are very confident in the security posture of our organization and all our instances.
[/av_textblock]

[av_textblock size=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” font_color=” color=” id=” custom_class=” av_uid=’av-k8ixf6uh’ admin_preview_bg=”]

Application Security

[/av_textblock]

[av_textblock size=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” font_color=” color=” id=” custom_class=” av_uid=’av-k8ixfref’ admin_preview_bg=”]
We utilize a full suite of secure software development activities and controls. All of our developers utilize secure coding practices, and we leverage as many security functions as are available within the development frameworks we use. We have secure coding practices mandated in our Development Style Guide, which provides guidance to all developers on implementing secure code from the beginning of the development lifecycle through to deployment of the application release.
[/av_textblock]

[av_textblock size=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” font_color=” color=” id=” custom_class=” av_uid=’av-k8ixg803′ admin_preview_bg=”]
Because we have access to a variety of scanning tools through our partners, all of our code is tested with multiple SAST, SCA, and DAST tools regularly. We combine the findings from all of these tools within Nucleus to leverage as many of the strengths of the individual tools as possible. All of our applications are scanned prior to a new release being pushed out to production. We have a team of users responsible for fixing any issues discovered in the vulnerability scans, and track finding status through the Nucleus platform.
[/av_textblock]

[av_textblock size=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” font_color=” color=” id=” custom_class=” av_uid=’av-k8ixhskp’ admin_preview_bg=”]
Additionally, Nucleus Security has completed the SOC-2 compliance process for Nucleus itself.
[/av_textblock]

[av_textblock size=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” font_color=” color=” id=” custom_class=” av_uid=’av-k8ixia7j’ admin_preview_bg=”]
We also conduct regular and scheduled 3rd party penetration tests and audits in order to ensure that we have been tested adequately against sophisticated attacks. Tests include: regular and continuous phishing assessments, blackbox penetration tests, whitebox (credentialed) assessments, and internal code reviews.
[/av_textblock]

[av_textblock size=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” font_color=” color=” id=” custom_class=” av_uid=’av-k8ixj5cr’ admin_preview_bg=”]
In addition to the secure development activities we employ, we utilize numerous controls to protect our client data. Some of, but not all of, the controls are as follows:

  • Encrypted Data at rest using industry best practices
  • Passwords stored in a salted hash
  • Encryption of all network traffic with TLS
  • Central logging and alerting
  • Locked down and hardened Nucleus instances with specific controls in place to minimize attack surface

[/av_textblock]

[/av_one_half][av_one_half min_height=” vertical_alignment=” space=” row_boxshadow=” row_boxshadow_color=” row_boxshadow_width=’10’ custom_margin=” margin=’0px’ mobile_breaking=” border=” border_color=” radius=’0px’ padding=’0px’ column_boxshadow=” column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” background_position=’top left’ background_repeat=’no-repeat’ highlight=” highlight_size=” animation=” link=” linktarget=” link_hover=” title_attr=” alt_attr=” mobile_display=” id=” custom_class=” aria_label=” av_uid=’av-27ima4′]

[av_textblock size=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” font_color=” color=” id=” custom_class=” av_uid=’av-k8ixk909′ admin_preview_bg=”]

Data Center

[/av_textblock]

[av_textblock size=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” font_color=” color=” id=” custom_class=” av_uid=’av-k8ixm4n7′ admin_preview_bg=”]
The data centers we use maintains a multitude of certifications which we can provide when requested. These certifications include but are not limited to:

  • FedRAMP (Available only in US regions)
  • ISO27001
  • AICPA SOC-I & II
  • PCI
  • C5
  • IRAP

[/av_textblock]

[av_textblock size=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” font_color=” color=” id=” custom_class=” av_uid=’av-k8ixmmfx’ admin_preview_bg=”]
All customer data is stored within a facility which meets these standards. Additionally, for overseas clients, we work with you to determine which region of the world you would like your data center to be based, so that you can meet local compliance requirements as well. Additionally, we have extra common-sense security controls on top of the compliance frameworks in use in order to minimize attack surface.
[/av_textblock]

[av_textblock size=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” font_color=” color=” id=” custom_class=” av_uid=’av-k8ixn0t7′ admin_preview_bg=”]
We conduct nightly vulnerability scanning of our network infrastructure with a variety of Network Security tools. We combine the findings from all of these tools within Nucleus to leverage as many of the strengths of the individual tools as possible. Similar to the application vulnerabilities, we have a team of users responsible for fixing any issues discovered in the vulnerability scans, and track finding status through the Nucleus platform.

The compliance certifications which our data centers meet also applies to physical security controls.
[/av_textblock]

[av_textblock size=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” font_color=” color=” id=” custom_class=” av_uid=’av-k8ixoff5′ admin_preview_bg=”]

See for Yourself

[/av_textblock]

[av_textblock size=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” font_color=” color=” id=” custom_class=” av_uid=’av-k8ixqq4a’ admin_preview_bg=”]
Don’t just take our word for it. The proof is in the pudding, as they say. We have a couple of ways that you can easily see that we take security seriously. We even went through the trouble of making the regular website secure. There are multiple websites that will do a quick analysis of your url for free, which we would recommend that you take a look at:

  • The first is: https://securityheaders.com/. Enter in the url of your trial instance or client instance and take a look to see how we are doing.
  • The second resource is ssl labs, provided by Qualys, which can be found here: https://www.ssllabs.com/ssltest/. Enter the url of your nucleus instance or a trial instance and see how we are doing! If you see something that you don’t like, feel free to reach out to us.

[/av_textblock]

[/av_one_half]