Security
Protecting Your Data and Privacy
Last updated: September 1, 2025
Table of Contents
- Security Overview
- Data Encryption
- Infrastructure Security
- Access Controls and Authentication
- Network Security
- Application Security
- Data Protection Measures
- Security Monitoring and Incident Response
- Compliance and Certifications
- Third-Party and Vendor Security
- Employee Security and Training
- User Security Best Practices
- Incident Reporting
- Security Updates and Patching
- Business Continuity and Disaster Recovery
- Contact Security Team
1. Security Overview
At NuroStride, security is at the core of everything we do. We understand that you trust us with your personal fitness data, and we take that responsibility seriously. Our comprehensive security program is designed to protect your information from unauthorized access, disclosure, alteration, or destruction.
Our Security Principles
Defense in Depth
Multiple layers of security controls to protect against various threats
Zero Trust
Never trust, always verify - every access request is authenticated and authorized
Privacy by Design
Security and privacy considerations built into every system and process
Continuous Improvement
Regular assessments, updates, and improvements to our security posture
1.1 Security Framework
Our security program is built on industry-recognized frameworks and standards:
- ISO 27001: Information Security Management System
- SOC 2 Type II: Service Organization Control reporting
- NIST Cybersecurity Framework: Risk management and security controls
- OWASP: Application security best practices
- GDPR: Data protection and privacy requirements
2. Data Encryption
We use industry-standard encryption to protect your data both in transit and at rest.
2.1 Data in Transit
- TLS 1.3: All data transmitted over the internet is encrypted using Transport Layer Security 1.3
- Certificate Validation: We use Extended Validation (EV) SSL certificates
- HSTS: HTTP Strict Transport Security enforces encrypted connections
- Perfect Forward Secrecy: Each session uses unique encryption keys
- API Security: All API communications use end-to-end encryption
2.2 Data at Rest
- AES-256: Database encryption using Advanced Encryption Standard 256-bit
- Key Management: Hardware Security Modules (HSMs) for key storage and management
- File System Encryption: Full disk encryption on all servers and storage systems
- Database Encryption: Column-level encryption for sensitive personal data
- Backup Encryption: All backups are encrypted using the same standards
2.3 Key Management
Our key management system ensures the security of encryption keys:
- Keys are stored in dedicated Hardware Security Modules (HSMs)
- Regular key rotation according to industry best practices
- Separation of duties for key management operations
- Audit trails for all key management activities
- Recovery procedures for key loss scenarios
3. Infrastructure Security
Our infrastructure is built on secure, enterprise-grade cloud services with multiple layers of protection.
3.1 Cloud Infrastructure
Amazon Web Services (AWS)
- SOC 2 Type II certified data centers
- Physical security with biometric access controls
- 24/7 security monitoring and staffing
- Redundant power and cooling systems
- Environmental controls and fire suppression
Geographic Distribution
- Multi-region deployment for resilience
- Data residency compliance with local laws
- Disaster recovery across multiple availability zones
- Content Delivery Network (CDN) for global performance
- Load balancing across regions
3.2 Server Security
- Hardened Operating Systems: Security-focused OS configurations
- Regular Patching: Automated security updates and patch management
- Minimal Attack Surface: Only necessary services and ports enabled
- Intrusion Detection: Host-based intrusion detection systems
- Log Monitoring: Centralized logging and real-time analysis
3.3 Container and Orchestration Security
- Kubernetes Security: Secured container orchestration platform
- Container Scanning: Vulnerability scanning for all container images
- Runtime Protection: Runtime security monitoring for containers
- Network Policies: Micro-segmentation between services
- Service Mesh: Encrypted service-to-service communication
4. Access Controls and Authentication
We implement strict access controls to ensure only authorized personnel can access systems and data.
4.1 User Authentication
Multi-Factor Authentication (MFA)
- Required for all user accounts
- Support for authenticator apps, SMS, and hardware tokens
- Biometric authentication on supported devices
- Risk-based authentication based on login patterns
Single Sign-On (SSO)
- Integration with Strava and other fitness platforms
- OAuth 2.0 and OpenID Connect protocols
- Session management and timeout controls
- Centralized authentication logs
4.2 Administrative Access
- Privileged Access Management: Dedicated system for administrative access
- Just-in-Time Access: Temporary elevated privileges when needed
- Session Recording: All administrative sessions are recorded
- Approval Workflows: Multi-person approval for sensitive operations
- Regular Access Reviews: Quarterly reviews of all access permissions
4.3 Role-Based Access Control (RBAC)
- Principle of least privilege for all system access
- Granular permissions based on job responsibilities
- Automated provisioning and deprovisioning
- Separation of duties for critical operations
- Regular access certification and cleanup
5. Network Security
Our network security measures protect against unauthorized access and network-based attacks.
5.1 Network Architecture
- Virtual Private Cloud (VPC): Isolated network environment
- Network Segmentation: Separate networks for different system tiers
- Private Subnets: Database and backend services in private networks
- Network Access Control Lists: Granular traffic filtering rules
- Jump Hosts: Secure access points for administrative tasks
5.2 Firewall and DDoS Protection
- Web Application Firewall (WAF): Protection against common web attacks
- Distributed Denial of Service (DDoS) Protection: Automatic mitigation of DDoS attacks
- Rate Limiting: API and request rate limiting to prevent abuse
- IP Reputation Filtering: Blocking traffic from known malicious sources
- Geo-blocking: Geographic restrictions where appropriate
5.3 Network Monitoring
- Traffic Analysis: Real-time network traffic monitoring
- Anomaly Detection: Machine learning-based threat detection
- Network Forensics: Detailed logging for security investigations
- Bandwidth Monitoring: Performance and security monitoring
- Alert Systems: Automated alerts for suspicious network activity
6. Application Security
We implement comprehensive security measures throughout the application development lifecycle.
6.1 Secure Development Lifecycle
Planning and Design
- Threat modeling for new features
- Security requirements definition
- Privacy impact assessments
- Architecture security reviews
Development
- Secure coding standards and guidelines
- Static Application Security Testing (SAST)
- Dependency scanning and management
- Code reviews with security focus
Testing
- Dynamic Application Security Testing (DAST)
- Interactive Application Security Testing (IAST)
- Penetration testing by third-party firms
- Security regression testing
Deployment
- Security configuration validation
- Automated security scanning
- Infrastructure as Code security
- Deployment approval gates
6.2 Application Security Controls
- Input Validation: Comprehensive validation of all user inputs
- Output Encoding: Proper encoding to prevent injection attacks
- SQL Injection Prevention: Parameterized queries and stored procedures
- Cross-Site Scripting (XSS) Protection: Content Security Policy and validation
- Cross-Site Request Forgery (CSRF) Protection: Anti-CSRF tokens
- Authentication and Session Management: Secure session handling
- Error Handling: Secure error messages that don't reveal sensitive information
6.3 API Security
- OAuth 2.0: Industry-standard authorization framework
- API Rate Limiting: Protection against abuse and DoS attacks
- Request Signing: Cryptographic signatures for API requests
- API Gateway: Centralized security enforcement point
- Input Validation: Comprehensive validation of all API inputs
- Logging and Monitoring: Detailed API access and usage logs
7. Data Protection Measures
We implement multiple layers of protection specifically for your personal and fitness data.
7.1 Data Classification
Public Data
Information that can be freely shared without risk
- Marketing materials and website content
- Public API documentation
- General product information
Internal Data
Information restricted to NuroStride employees
- Business plans and strategies
- Internal procedures and policies
- Employee information
Confidential Data
Sensitive business information requiring protection
- Customer lists and business relationships
- Financial information
- Proprietary algorithms and code
Highly Confidential Data
Most sensitive data requiring highest protection
- Personal identifiable information (PII)
- Health and fitness data
- Payment information
- Authentication credentials
7.2 Data Handling Procedures
- Data Minimization: Collect and retain only necessary data
- Purpose Limitation: Use data only for specified purposes
- Retention Policies: Automatic deletion of data after retention periods
- Data Anonymization: Remove personal identifiers where possible
- Secure Deletion: Cryptographic erasure and secure deletion procedures
7.3 Database Security
- Database Encryption: Transparent data encryption at rest
- Connection Encryption: SSL/TLS for all database connections
- Database Firewalls: Protection against SQL injection and unauthorized access
- Database Activity Monitoring: Real-time monitoring of database access
- Privileged User Monitoring: Enhanced monitoring for administrative access
- Data Loss Prevention: Automated detection of unauthorized data access
8. Security Monitoring and Incident Response
We maintain 24/7 security monitoring and have comprehensive incident response procedures.
8.1 Security Operations Center (SOC)
24/7 Monitoring
- Round-the-clock security monitoring
- Real-time threat detection and analysis
- Automated alert escalation procedures
- Security incident tracking and management
Security Information and Event Management (SIEM)
- Centralized log collection and analysis
- Correlation of security events across systems
- Machine learning-based anomaly detection
- Automated threat intelligence integration
Threat Intelligence
- Integration with threat intelligence feeds
- Indicators of Compromise (IoC) monitoring
- Threat hunting activities
- Security research and analysis
8.2 Incident Response Process
- Detection: Automated and manual detection of security incidents
- Classification: Categorization based on severity and impact
- Containment: Immediate actions to limit the scope of the incident
- Investigation: Forensic analysis to understand the incident
- Eradication: Removal of the threat and vulnerabilities
- Recovery: Restoration of normal operations
- Lessons Learned: Post-incident review and improvements
8.3 Security Metrics and Reporting
- Key Performance Indicators (KPIs): Regular measurement of security effectiveness
- Security Dashboards: Real-time visibility into security posture
- Executive Reporting: Regular security reports to leadership
- Compliance Reporting: Automated compliance status reporting
- Trend Analysis: Long-term analysis of security trends and patterns
9. Compliance and Certifications
We maintain compliance with industry standards and regulations to ensure the highest level of security and data protection.
SOC 2 Type II
Annual audits of our security, availability, and confidentiality controls
- Third-party audited security controls
- Continuous monitoring and improvement
- Annual compliance reporting
GDPR Compliance
Full compliance with European data protection regulations
- Privacy by design principles
- Data subject rights implementation
- Data Protection Impact Assessments
ISO 27001
Information Security Management System certification
- Risk-based security management
- Continuous improvement processes
- Regular internal and external audits
PCI DSS
Payment Card Industry Data Security Standard compliance
- Secure payment processing
- Regular vulnerability scans
- Quarterly compliance assessments
9.1 Regular Audits and Assessments
- Internal Audits: Quarterly internal security assessments
- External Audits: Annual third-party security audits
- Penetration Testing: Quarterly penetration tests by certified firms
- Vulnerability Assessments: Monthly vulnerability scans and assessments
- Compliance Reviews: Regular reviews of compliance requirements
10. Third-Party and Vendor Security
We carefully evaluate and monitor the security practices of all third-party vendors and service providers.
10.1 Vendor Risk Assessment
- Security Questionnaires: Comprehensive security assessments for all vendors
- Compliance Verification: Verification of vendor security certifications
- Contract Security Requirements: Security clauses in all vendor contracts
- Regular Reviews: Annual reassessment of vendor security practices
- Data Processing Agreements: GDPR-compliant data processing agreements
10.2 Key Third-Party Services
Cloud Infrastructure
- Amazon Web Services (SOC 2, ISO 27001)
- Google Cloud Platform (SOC 2, ISO 27001)
- Cloudflare (SOC 2, ISO 27001)
Payment Processing
- Stripe (PCI DSS Level 1)
- PayPal (PCI DSS Level 1)
- Apple Pay (Tokenization)
Data Integration
- Strava API (OAuth 2.0 security)
- Third-party fitness platforms
- Social media integrations
Analytics and Monitoring
- Google Analytics (Privacy-focused)
- Mixpanel (GDPR compliant)
- Security monitoring tools
10.3 Vendor Monitoring
- Continuous Monitoring: Ongoing assessment of vendor security posture
- Security Incident Coordination: Joint incident response procedures
- Performance Reviews: Regular reviews of vendor security performance
- Contract Renewals: Updated security requirements in contract renewals
11. Employee Security and Training
Our employees are a critical component of our security program. We invest heavily in security training and awareness.
11.1 Security Training Program
New Employee Onboarding
- Comprehensive security orientation
- Security policies and procedures training
- Role-specific security requirements
- Security awareness assessment
Ongoing Security Education
- Monthly security awareness training
- Quarterly phishing simulation exercises
- Annual security refresher training
- Threat intelligence briefings
Specialized Training
- Secure development training for engineers
- Privacy training for data handlers
- Incident response training for security team
- Compliance training for relevant roles
11.2 Security Policies and Procedures
- Acceptable Use Policy: Guidelines for appropriate use of company systems
- Data Handling Procedures: Specific procedures for handling sensitive data
- Incident Reporting: Clear procedures for reporting security incidents
- Access Control Procedures: Guidelines for requesting and managing access
- Remote Work Security: Security requirements for remote workers
11.3 Security Culture
- Security Champions: Employee advocates for security best practices
- Security Feedback: Anonymous reporting system for security concerns
- Recognition Programs: Rewards for good security practices
- Regular Communications: Security newsletter and updates
12. User Security Best Practices
Your security is a partnership between NuroStride and you. Here are important steps you can take to protect your account and data.
Strong Authentication
- Use a strong, unique password for your NuroStride account
- Enable two-factor authentication (2FA)
- Use biometric authentication when available
- Don't share your login credentials
- Log out of shared or public devices
Account Security
- Regularly review your account activity
- Keep your contact information up to date
- Monitor for unauthorized access or changes
- Use official NuroStride apps and website only
- Be cautious of phishing attempts
Device Security
- Keep your devices and apps updated
- Use device lock screens and encryption
- Only download apps from official stores
- Be cautious on public Wi-Fi networks
- Report lost or stolen devices immediately
Privacy Settings
- Review and adjust your privacy settings
- Control who can see your fitness data
- Manage third-party app permissions
- Understand data sharing preferences
- Regularly review connected accounts
12.1 Recognizing Security Threats
Phishing Attempts
- Be suspicious of unexpected emails requesting login
- Always verify the sender's identity
- Check URLs carefully before clicking
- Look for spelling and grammar errors
- When in doubt, contact us directly
Social Engineering
- Be cautious of unsolicited phone calls
- Never provide passwords or personal information
- Verify the identity of callers claiming to be from NuroStride
- Be suspicious of urgent requests for information
- Report suspicious contact attempts
13. Incident Reporting
We encourage users and employees to report security incidents or concerns promptly.
13.1 What to Report
- Suspicious account activity or unauthorized access
- Potential security vulnerabilities
- Phishing attempts or social engineering
- Lost or stolen devices with access to your account
- Suspected data breaches or privacy violations
- Any other security-related concerns
13.2 How to Report
Security Incidents
Email: security@nurostride.com
Response Time: Within 1 hour during business hours
24/7 Urgent: Use subject line "URGENT SECURITY INCIDENT"
Vulnerability Reports
Email: security@nurostride.com
Bug Bounty: We maintain a responsible disclosure program
PGP Key: Available for encrypted communications
General Security Questions
Email: support@nurostride.com
In-App: Use the security section in app settings
Response Time: Within 24 hours
13.3 Responsible Disclosure
We appreciate security researchers who help us maintain security. Our responsible disclosure program includes:
- Recognition for valid security reports
- Reasonable time to address reported vulnerabilities
- Protection from legal action for good-faith research
- Coordination on public disclosure timing
- Potential rewards for significant vulnerability discoveries
14. Security Updates and Patching
We maintain a comprehensive patch management program to ensure all systems remain secure and up to date.
14.1 Patch Management Process
- Vulnerability Identification: Continuous monitoring for new vulnerabilities
- Risk Assessment: Evaluation of vulnerability impact and exploitability
- Patch Testing: Testing in isolated environments before deployment
- Deployment Planning: Scheduling updates to minimize service disruption
- Implementation: Automated and manual patch deployment
- Verification: Confirmation that patches were applied successfully
- Documentation: Recording of all patch activities
14.2 Update Categories
Critical Security Updates
- Deployed within 24 hours of availability
- May require emergency maintenance windows
- Users notified of any service interruptions
- Post-deployment monitoring and verification
High Priority Updates
- Deployed within 72 hours
- Scheduled during regular maintenance windows
- Advance notice provided to users
- Rollback procedures ready if needed
Regular Updates
- Deployed during scheduled maintenance
- Bundled with feature releases when possible
- Extensive testing and quality assurance
- User communication about changes
14.3 User Application Updates
- Automatic Updates: Critical security updates deployed automatically
- Update Notifications: Users notified of available updates
- Forced Updates: Critical security updates may be required
- Backward Compatibility: Support for recent app versions
- Update Channels: Beta and production update channels
15. Business Continuity and Disaster Recovery
We have comprehensive plans to ensure service availability and data protection during emergencies or disasters.
15.1 Business Continuity Planning
- Risk Assessment: Identification of potential business disruptions
- Impact Analysis: Assessment of potential impact on operations
- Continuity Strategies: Plans to maintain critical operations
- Resource Planning: Allocation of resources for emergency situations
- Communication Plans: Procedures for stakeholder communication
15.2 Disaster Recovery
Data Backup and Recovery
- Automated daily backups of all critical data
- Geographically distributed backup storage
- Regular backup integrity testing
- Point-in-time recovery capabilities
- Encrypted backup transmission and storage
Infrastructure Resilience
- Multi-region deployment architecture
- Automated failover capabilities
- Load balancing and redundancy
- Database replication and clustering
- Content delivery network (CDN) distribution
Recovery Procedures
- Documented recovery procedures
- Regular disaster recovery testing
- Recovery time objectives (RTO) definition
- Recovery point objectives (RPO) definition
- Post-incident review and improvement
15.3 Service Level Objectives
- Availability: 99.9% uptime commitment
- Recovery Time: Maximum 4-hour recovery for major incidents
- Data Loss: Maximum 1-hour data loss in worst-case scenarios
- Communication: User notification within 30 minutes of incidents
- Status Updates: Regular updates during extended outages
16. Contact Security Team
Our security team is available to assist with security questions, concerns, and incident reports.
Security Incidents
Email: security@nurostride.com
For: Urgent security incidents and breaches
Response: Within 1 hour during business hours
24/7: Use "URGENT" in subject line for immediate response
Vulnerability Reporting
Email: security@nurostride.com
For: Security vulnerability reports
Response: Within 24 hours
Encryption: PGP key available for sensitive reports
General Security Questions
Email: support@nurostride.com
For: General security questions and guidance
Response: Within 24 hours
Subject: Include "Security Question" in subject line
Compliance and Legal
Email: legal@nurostride.com
For: Compliance questions and legal security matters
Response: Within 48 hours
Documentation: Security certifications and compliance reports
16.1 Security Communications
Stay informed about security updates and best practices:
- Security Newsletter: Monthly security tips and updates
- Status Page: Real-time service and security status
- Security Blog: In-depth security articles and insights
- Social Media: Follow @NuroStrideSec for security updates
- In-App Notifications: Important security alerts and tips
Disclaimer: This security information is provided for transparency and educational purposes. Specific security measures may change as we continuously improve our security posture. For the most current information or specific security questions, please contact our security team.