π₯οΈ System Configuration and Hardening Standards
1. Purpose
This document defines Nemu Inc.βs approach to system configuration and hardening for workloads and operating systems used to deliver its services.
2. CSP-Managed Infrastructure
Nemu Inc. primarily relies on:
- Render: for hosting application services in managed containers or runtimes.
- Supabase: for managed Postgres and storage.
These providers are responsible for:
- Operating system patching and base system hardening.
- Secure default configurations for network and storage.
3. Application-Level Hardening
Within the application and runtime layer, Nemu Inc.:
- Uses minimal base images where custom containers are needed.
- Avoids unnecessary services, ports, and packages.
- Enforces HTTPS and secure cookie settings for web-facing applications.
- Configures Node.js and Next.js apps with environment-specific configuration and secret management.
4. Workstations and Local Services
Where local development or server processes run on workstations:
- OS-level security settings align with endpoint security standards.
- Access to local services is restricted to the developer or team as needed.
5. Audit Evidence
- Dockerfile or runtime configuration examples.
- CSP documentation on managed runtime security.
- Internal documentation referencing hardened configuration choices.
6. Compliance Mapping
- SOC 2: CC6.6, CC7.1
- ISO 27001:2013: A.12.1.2, A.14.2.5
Contact: support@mynemu.com
Β© 2025 Nemu Inc.. All rights reserved.
Last updated on