Security at Nerlude
Your security is our top priority. Learn how we protect your credentials, data, and privacy with industry-leading security practices.
In this guide
Security Overview
Nerlude is built from the ground up with security in mind. We understand that you're trusting us with sensitive information—API keys, passwords, and business-critical credentials—and we take that responsibility seriously.
Our security approach is based on three principles:
- Defense in depth - Multiple layers of security at every level
- Least privilege - Access only what's needed, when it's needed
- Transparency - Clear communication about how we protect your data
How We Encrypt Your Data
Encryption at rest
All sensitive data stored in Nerlude is encrypted using AES-256 encryption, the same standard used by banks and government agencies. This includes:
- API keys and secrets
- Passwords and tokens
- Database connection strings
- Any custom credentials you store
Encryption in transit
All data transmitted between your browser and our servers is encrypted using TLS 1.3. We enforce HTTPS on all connections and use HSTS to prevent downgrade attacks.
Key management
Encryption keys are managed using industry best practices:
- Keys are stored separately from encrypted data
- Keys are rotated regularly
- Access to keys is strictly controlled and audited
- We use hardware security modules (HSMs) for key storage
Credential Security
Credentials are the most sensitive data in Nerlude, and we treat them with extra care:
🔐 Zero-knowledge architecture
Credentials are encrypted before they leave your browser. We never see your plaintext secrets.
👁️ View-only decryption
Credentials are only decrypted when you explicitly choose to view them. They're never decrypted in the background.
📋 Secure clipboard
When you copy a credential, it's automatically cleared from your clipboard after 30 seconds.
📝 Access logging
Every credential access is logged with timestamp, user, and IP address for audit purposes.
Authentication & Access
Password security
- Passwords are hashed using bcrypt with high work factor
- We enforce minimum password requirements
- Passwords are checked against known breach databases
- We never store plaintext passwords
Two-factor authentication (2FA)
We strongly recommend enabling 2FA on your account. We support:
- Authenticator apps (Google Authenticator, Authy, 1Password)
- SMS verification (as backup)
- Recovery codes for account recovery
Session management
- Sessions expire after 30 days of inactivity
- You can view and revoke active sessions
- Sensitive actions require re-authentication
- Sessions are invalidated on password change
Infrastructure Security
Our infrastructure is designed for security and reliability:
- Cloud hosting - We use enterprise-grade cloud providers with SOC 2 Type II certification
- Network security - Firewalls, DDoS protection, and intrusion detection systems
- Database security - Encrypted databases with automated backups and point-in-time recovery
- Monitoring - 24/7 monitoring for security anomalies and performance issues
- Regular updates - Security patches applied within 24 hours of release
Compliance & Certifications
🛡️ SOC 2 Type II
We're SOC 2 ready and working toward full certification. Our controls meet SOC 2 requirements for security, availability, and confidentiality.
🇪🇺 GDPR Compliant
We comply with GDPR requirements including data minimization, right to erasure, and data portability.
🔒 CCPA Compliant
California residents have full rights under CCPA to access, delete, and opt-out of data sales.
📋 Data Processing Agreement
We offer DPAs for enterprise customers who need them for compliance purposes.
Security Best Practices
Here's how you can help keep your account secure:
- Enable two-factor authentication
This is the single most effective way to protect your account.
- Use a strong, unique password
Use a password manager to generate and store a unique password for Nerlude.
- Review team access regularly
Remove team members who no longer need access.
- Use role-based permissions
Give team members only the access they need.
- Monitor credential access
Review audit logs to see who's accessing sensitive credentials.
- Keep credentials up to date
Rotate credentials regularly and remove unused ones.
- Use temporary access for contractors
Set expiration dates for external collaborators.
Reporting Vulnerabilities
We take security vulnerabilities seriously. If you discover a security issue, please report it responsibly:
How to report
Email us at security@nerlude.io with:
- • Description of the vulnerability
- • Steps to reproduce
- • Potential impact
- • Any proof-of-concept code
We commit to:
- Acknowledge your report within 24 hours
- Provide regular updates on our progress
- Not take legal action against good-faith reporters
- Credit you in our security acknowledgments (if desired)
Questions about security?
Our security team is happy to answer any questions about how we protect your data.
Contact Security Team