NexaGuard
  1. Security-and-Privacy
NexaGuard
  • Getting-Started
    • NexaGuard Developer Documentation
    • Quickstart (5 to 10 Minutes)
    • Documentation Overview
    • Concepts and Glossary
  • Compliance-and-Standards
    • Compliance Overview
    • IAB TCF v2.3 Support
    • Google Consent Mode v2 Validation
    • TCF API Validation
    • Audit Checklist (Pre-Launch)
  • Web-and-CMS-Integrations
    • NexaGuard CMP SDK – Web & GTM Setup
    • Integrate NexaGuard CMP with Webflow and Wix
    • Integrate NexaGuard CMP with WordPress
    • Integrate NexaGuard CMP with Drupal
    • Integrate NexaGuard CMP with Shopify
  • Mobile-SDKs
    • NexaGuard CMP SDK - iOS Setup
    • iOS SDK API Reference
    • NexaGuard CMP SDK - Android Setup
    • Android SDK API Reference
    • App Attribution Partner (AAP) Integrations
  • Developer-Reference
    • Web JS API Reference
    • Consent Event Schema
    • Deployment and Environments
    • NexaGuard Debug Tool
    • Troubleshooting Playbook
    • Performance and Best Practices
    • Accessibility and UX Guidelines
    • Localization Workflow
    • Migration Guide
  • Security-and-Privacy
    • Security Overview
    • Privacy Architecture
    • Data and Logging Transparency
    • Subprocessors
    • CSP and Network Allowlist
  • Enterprise-and-Legal
    • DPA and Legal Pack
    • RFP Feature Matrix
    • Status and Reliability
    • Support and Escalation
    • NexaGuard CMP SDK – Commercial Licence
  • Operations
    • Changelog and Version Policy
  1. Security-and-Privacy

Security Overview

Last updated: February 18, 2026
This page outlines the high-level security posture of NexaGuard CMP. NexaGuard implements layered technical and organizational security controls designed to protect customer data, consent signals, and platform integrity.

1. Transport and Network Security#

HTTPS enforced for all CMP, API, and asset delivery endpoints.
Minimum TLS version: TLS 1.2 (TLS 1.3 preferred where supported).
HSTS enabled on production domains to prevent downgrade attacks.
Production traffic is routed through managed, globally distributed delivery infrastructure with standard threat protection controls.
No HTTP endpoints are exposed for public production services.

2. Data Security Controls#

Encryption in transit: enabled using TLS 1.2+.
Encryption at rest: enabled for production data stores managed by infrastructure providers.
Key management: encryption keys are managed by the underlying cloud infrastructure provider using provider-managed key services.
No plaintext consent data is stored outside secured infrastructure boundaries.
NexaGuard does not store personal identifiers; only pseudonymous consent state tokens are processed.

3. Access and Identity#

Role-based access control (RBAC) enforced for administrative systems.
Production access follows a least-privilege model.
Multi-factor authentication (MFA) required for privileged administrative access.
Administrative actions are logged for audit purposes.
Access to production systems is restricted to authorized personnel only.

4. Logging and Monitoring#

Security-relevant events (authentication, configuration changes, deployment actions) are logged.
Infrastructure monitoring and alerting are configured for service availability and anomalous activity.
Alerts are reviewed by designated technical personnel.
Audit logs are retained according to internal operational policy.

5. Vulnerability Management#

Regular dependency updates are performed to address security patches.
Automated dependency scanning is performed during development workflows.
Infrastructure components are updated according to a rolling patch schedule.
Critical security patches are prioritized and deployed without undue delay.
External penetration testing may be conducted periodically, subject to internal scheduling and scope.

6. Incident Response#

NexaGuard maintains an internal incident intake and triage process.
Security incidents are classified based on severity and impact.
Customers are notified of material security incidents affecting their data without unreasonable delay, in accordance with contractual obligations.
Post-incident reviews are conducted to identify root cause and remediation actions.

7. Data Isolation#

NexaGuard implements logical tenant isolation within application architecture.
Production and non-production environments are separated.
Staging and development systems do not process live production consent data unless explicitly configured for testing.
Customer data is not commingled across tenant boundaries.

8. Security Contact#

Security disclosure channel: [email protected]
Vulnerability reports are reviewed and triaged by the technical team.
For customer-impacting issues, escalation procedures are defined in the Support and Escalation page.
Previous
Migration Guide
Next
Privacy Architecture