Security at Adverant

Security built into every layer of our platform. Your data is protected by encryption, access controls, and continuous monitoring.

Last Updated: March 30, 2026

Encryption Everywhere

TLS in transit, AES-256 at rest across all services

Active

Zero Trust Architecture

Service mesh mTLS, role-based access, multi-factor authentication

Active

GDPR Aligned

Building toward full compliance with European data protection regulations

In Progress

Continuous Monitoring

Automated threat detection, anomaly analysis, and audit logging

Active

Security Overview

Security is a core part of how we build and operate the Nexus platform. We protect your data with encryption, access controls, and continuous monitoring across every layer of our infrastructure.

Our security program includes:

  • Infrastructure Security: Kubernetes with Istio service mesh and Cloudflare edge protection
  • Data Protection: Encryption at rest (AES-256) and in transit (TLS)
  • Access Management: OAuth 2.0/OIDC authentication with RBAC and MFA
  • Continuous Monitoring: Automated threat detection and anomaly analysis
  • Privacy: Building toward GDPR compliance with data protection by design

For security questions or to report vulnerabilities, reach out via our contact form.

Infrastructure Security

Edge Protection

All traffic to Adverant services passes through Cloudflare:

  • WAF: Web Application Firewall with Layer 7 protection and managed rulesets
  • DDoS Mitigation: Automatic Layer 3/4 and Layer 7 DDoS protection
  • CDN: Global edge caching to reduce origin exposure
  • Rate Limiting: Per-endpoint rate limiting and bot management
  • IP Reputation: Automated threat intelligence filtering

Service Mesh and Network Isolation

Services run on Kubernetes (K3s) with Istio service mesh:

  • Mutual TLS (mTLS): All service-to-service communication is encrypted and authenticated via Istio
  • Network Policies: Default-deny ingress with explicit allowlists per service
  • Namespace Isolation: Services separated into Kubernetes namespaces with RBAC boundaries
  • Ingress Control: Istio gateway with VirtualService routing and header-based security policies

Firewall and Access Controls

  • Default-deny firewall policies for all inbound traffic
  • SSH access restricted to key-based authentication only
  • Administrative access limited to allowlisted IPs
  • Internal services not exposed to the public internet

Data Security

Encryption at Every Layer

All data is encrypted in transit over networks and at rest in storage. Your data is never stored in plain text.

Encryption at Rest

  • Algorithm: AES-256 encryption for all stored data
  • Databases: PostgreSQL with encrypted storage volumes
  • Graph Database: Neo4j with encrypted storage for knowledge graphs
  • Vector Database: Qdrant with encrypted storage for semantic search
  • Cache: Redis with TLS-encrypted connections
  • Volumes: Encrypted persistent volumes for all Kubernetes workloads

Encryption in Transit

  • TLS: All external API and web traffic encrypted via TLS (Cloudflare edge termination)
  • mTLS: Mutual TLS for all internal service-to-service communication via Istio
  • Database Connections: SSL/TLS required for all database connections
  • WebSockets: WSS (WebSocket Secure) for all real-time streams

Multi-Tenant Data Isolation

  • Namespace Isolation: Tenant data separated via application-level namespacing (company ID + app ID headers)
  • Row-Level Security: PostgreSQL RLS policies enforce tenant boundaries at the database level
  • Vector Isolation: Qdrant tenant filtering ensures semantic search results are scoped per tenant
  • API Signing: HMAC-SHA256 signed requests between frontend proxy and backend services

Access Control

Authentication

  • OAuth 2.0 / OIDC: Standard-compliant authentication via our nexus-auth service
  • Multi-Factor Authentication: TOTP-based MFA available for all accounts
  • JWT Tokens: Short-lived access tokens with refresh token rotation
  • Session Management: Server-side session tracking with configurable timeouts

Role-Based Access Control (RBAC)

Granular permissions based on the principle of least privilege:

  • Owner: Full administrative control
  • Admin: User management and billing
  • Developer: API access and application management
  • Viewer: Read-only access to resources

API Security

  • API keys scoped per application with read/write permissions
  • JWT-validated proxy with HMAC-SHA256 request signing
  • Rate limiting per endpoint and per tenant
  • Request validation and input sanitization

Monitoring and Threat Detection

Automated Threat Detection

Our platform includes automated security monitoring agents that continuously analyze system behavior:

  • Anomaly Detection: Automated analysis of access patterns and API usage
  • Threat Detectors: Multiple detection engines for brute force, credential stuffing, privilege escalation, data exfiltration, and suspicious API patterns
  • Service Health Probing: Periodic HTTP health checks across all services with automatic alerting
  • Container Monitoring: Kubernetes pod health, restart detection, and resource anomaly tracking

Audit Logging

  • All authentication events logged (login, logout, MFA, failed attempts)
  • API access logged with user, endpoint, timestamp, and response status
  • Administrative actions tracked with full audit trail
  • Audit logs stored in PostgreSQL with retention policies

Incident Response

In the event of a security incident:

  • Detection: Automated alerts from monitoring agents trigger investigation
  • Containment: Isolation of affected services via Kubernetes network policies
  • Notification: Affected customers notified within 72 hours as required by applicable regulations
  • Post-Incident: Root cause analysis and remediation documented

Vulnerability Management

Dependency Scanning

  • Container Scanning: Automated vulnerability scanning of Docker images
  • Dependency Auditing: Automated alerts for known vulnerabilities in third-party libraries
  • SAST: Static analysis integrated into our development workflow

Patch Management

  • Critical: Patched as soon as possible, typically within 24-48 hours
  • High: Patched within 7 days
  • Medium: Patched within 30 days
  • Low: Addressed in regular maintenance cycles
  • Rolling deployments for zero-downtime updates

Security Hardening

We perform regular security reviews of our codebase. In March 2026, we completed a comprehensive security hardening across 54 files, addressing 16 identified vulnerabilities including multi-tenant isolation, authentication token handling, and input validation across chat, terminal, and API surfaces.

Responsible Disclosure

How to Report Vulnerabilities

If you discover a security vulnerability in our services, we encourage you to report it responsibly. We are committed to working with security researchers to verify and address vulnerabilities.

Reporting Process

  • Submit via our contact form with "Security" as the subject
  • Include a detailed description of the vulnerability
  • Provide steps to reproduce the issue
  • Include any proof-of-concept code or screenshots
  • Share your contact information for follow-up

What to Expect

  • Acknowledgment: Within 48 hours
  • Initial Assessment: Within 7 days
  • Resolution Timeline: Based on severity
  • Public Disclosure: Coordinated after patch deployment

Guidelines

  • Do not exploit vulnerabilities beyond proof of concept
  • Do not access, modify, or delete customer data
  • Do not perform denial-of-service attacks
  • Allow reasonable time to patch before public disclosure

Safe Harbor

We will not pursue legal action against security researchers who follow our responsible disclosure guidelines and make a good faith effort to avoid privacy violations and service disruption.

Contact Security Team

For security inquiries, vulnerability reports, or general questions, reach out through our contact form:

Contact Us

For security-related inquiries, please include "Security" in the subject line.

Security Questions?

Our team is available to discuss your security and data protection requirements.