π©Ή Security Patch Process
1. Purpose
This document outlines Nemu Inc.βs process for identifying, evaluating, and applying security patches to systems, applications, and dependencies.
2. Scope
Includes:
- Node.js and related runtime dependencies used by Nemu Inc.βs APIs and Next.js applications.
- Application dependencies managed via
npm/pnpm. - Runtime environments managed by Render and Supabase.
3. Patch Management Approach
3.1 CSP and Managed Services
- Supabase and Render are responsible for patching underlying infrastructure, operating systems, and managed services.
- Nemu Inc. monitors provider communications for security advisories or changes that may impact applications.
3.2 Application and Dependency Patching
For application code and libraries:
-
Cloud Provider Native Patching Render.com infrastructure automatically applies OS-level and container-level security updates on the underlying systems.
-
Container Rebuild Pipeline (CI/CD) Application images are rebuilt through GitHub Actions, which ensures:
- Latest base images
- Updated dependencies
- Patched runtimes (Node.js, Bun, Debian/Ubuntu base layers)
- Deepsource audits
-
Dependency Vulnerability Scanning GitHub Dependabot alerts are used to detect and prompt upgrades for vulnerable npm/Bun packages.
3.3 Process Steps
- Identification:
- Receive alerts from dependency scanning tools or advisories.
- Assessment:
- Evaluate severity and affected components.
- Vendor security advisories (Apple, Microsoft, Linux distributions).
- Software provider notifications.
- Implementation:
- Update dependencies or runtime versions.
- Run automated tests and regression checks.
- Standard-risk patches applied during regular release cycles.
- Deployment:
- Deploy patched versions via CI/CD pipelines to staging and then production.
- Verification:
- Confirm application health and logs after deployment.
4. Tools Used
- Dependency scanning (
bun audit, GitHub Dependabot, deepsource). - CI/CD pipelines for building and deploying patched versions.
- Render logs for monitoring application behavior post-deployment.
5. Audit Evidence
- Records or logs of dependency updates and merged pull requests.
- Example of a security patch change set.
- Screenshots or logs from vulnerability scanning tools.
6. Compliance Mapping
- SOC 2: CC7.1, CC7.2
- ISO 27001:2013: A.12.6.1
Contact: support@mynemu.com
Β© 2025 Nemu Inc.. All rights reserved.
Last updated on