Skip to Content
Nemu Inc.
It Operations Management🩹 Security Patch Process

🩹 Security Patch Process

1. Purpose

This document outlines Nemu Inc.’s process for identifying, evaluating, and applying security patches to systems, applications, and dependencies.

2. Scope

Includes:

  • Node.js and related runtime dependencies used by Nemu Inc.’s APIs and Next.js applications.
  • Application dependencies managed via npm / pnpm.
  • Runtime environments managed by Render and Supabase.

3. Patch Management Approach

3.1 CSP and Managed Services

  • Supabase and Render are responsible for patching underlying infrastructure, operating systems, and managed services.
  • Nemu Inc. monitors provider communications for security advisories or changes that may impact applications.

3.2 Application and Dependency Patching

For application code and libraries:

  • Cloud Provider Native Patching Render.com infrastructure automatically applies OS-level and container-level security updates on the underlying systems.

  • Container Rebuild Pipeline (CI/CD) Application images are rebuilt through GitHub Actions, which ensures:

    • Latest base images
    • Updated dependencies
    • Patched runtimes (Node.js, Bun, Debian/Ubuntu base layers)
    • Deepsource audits
  • Dependency Vulnerability Scanning GitHub Dependabot alerts are used to detect and prompt upgrades for vulnerable npm/Bun packages.

3.3 Process Steps

  1. Identification:
    • Receive alerts from dependency scanning tools or advisories.
  2. Assessment:
    • Evaluate severity and affected components.
    • Vendor security advisories (Apple, Microsoft, Linux distributions).
    • Software provider notifications.
  3. Implementation:
    • Update dependencies or runtime versions.
    • Run automated tests and regression checks.
    • Standard-risk patches applied during regular release cycles.
  4. Deployment:
    • Deploy patched versions via CI/CD pipelines to staging and then production.
  5. Verification:
    • Confirm application health and logs after deployment.

4. Tools Used

  • Dependency scanning (bun audit, GitHub Dependabot, deepsource).
  • CI/CD pipelines for building and deploying patched versions.
  • Render logs for monitoring application behavior post-deployment.

5. Audit Evidence

  • Records or logs of dependency updates and merged pull requests.
  • Example of a security patch change set.
  • Screenshots or logs from vulnerability scanning tools.

6. Compliance Mapping

  • SOC 2: CC7.1, CC7.2
  • ISO 27001:2013: A.12.6.1

Contact: support@mynemu.com
Β© 2025 Nemu Inc.. All rights reserved.

Last updated on