π΅οΈ Vulnerability Scanning Process
1. Purpose
This document explains Nemu Inc.βs process for conducting internal and/or external vulnerability assessment activities.
2. Scope
Covers:
- Application-level vulnerabilities in web and API services.
- Dependencies used in Nemu Inc.βs software.
- CSP-managed services where vulnerability visibility is available.
3. Scanning Methods
- Dependency Scanning:
- Use of tools such as
npm auditor repository-integrated scanners (e.g., GitHub Dependabot) to identify vulnerable libraries.
- Use of tools such as
- Application and Infrastructure:
- CSP-level scanning and monitoring where provided.
- Optional use of third-party scanning services for public endpoints.
4. Process Steps
- Identify Vulnerabilities:
- Monitor tools for new findings.
- Triage and Prioritize:
- Classify by severity and exploitability.
- Remediation:
- Update dependencies, adjust configurations, or apply patches.
- Validation:
- Confirm issues are resolved via rescans or tests.
- Documentation:
- Record key findings and remediation steps.
5. Latest Scan Results
- Nemu Inc. maintains internal records of recent vulnerability scans and resolutions, which may be shared with customers under NDA upon request.
6. Audit Evidence
- Example vulnerability scan reports (with sensitive details redacted).
- Records of remediation tickets and code changes.
- Documentation of scanning schedule and tools.
7. Compliance Mapping
- SOC 2: CC7.1, CC7.2
- ISO 27001:2013: A.12.6.1
Contact: support@mynemu.com
Β© 2025 Nemu Inc.. All rights reserved.
Last updated on