Nerve.io Security: Protecting Your Registrar Credentials

Michael Cyger September 3, 2025 (Updated: September 2, 2025) 12 min read

Your domains are valuable assets that require enterprise-level security protection.

They deserve the same level of protection that banks use for financial data.

At Nerve.io, I've built our security architecture from the ground up to address the unique challenges of domain management while maintaining transparency about our approach and limitations.

This article provides a comprehensive overview of our current security measures, explains how we protect against various threat scenarios, and outlines our roadmap for future enhancements as we expand from read-only operations to full create, update, and delete capabilities.

Current Security Architecture

The Unscoped Credentials Problem

Before diving into our security architecture, it's important to understand the fundamental problem Nerve.io is solving.

All registrars that provide API functionality offer unscoped credentials. This means that when you give someone access to your registrar account through your API credentials, they have complete control over all your domains.

This creates a MASSIVE security risk, especially as we enter the AI and Agent growth curve.

Here are some likely scenarios where unscoped credentials can lead to disaster:

AI/LLM Integration Risks:

Third-Party Developer Risks:

Agent Automation Risks:

This is exactly why I built Nerve.io's scoped access system – to prevent these scenarios from becoming reality.

While registrars could theoretically implement their own scoped credential systems, this would require every registrar to independently develop and maintain such features.

Given their current priorities and the fragmented nature of the domain industry, this is unlikely to happen anytime soon.

Even if they did, users would still need to manage separate scoped credentials across multiple registrars, losing the unified management experience that Nerve.io provides.

Google Cloud KMS Encryption

Our primary defense mechanism centers around Google Cloud Key Management Service (KMS).

When users provide their registrar API credentials, these sensitive details are immediately encrypted using AES-256 encryption before being stored in our database.

The encryption process works as follows:

This approach ensures that even if our database is compromised, attackers cannot access the actual API keys without also compromising our Google Cloud infrastructure and the specific KMS keys used for encryption.

Limited Access Keys (LAKs)

Instead of exposing master registrar credentials, we implement a Limited Access Key system that provides temporary, scoped access to specific domains and operations.

Each LAK includes multiple layers of access control and restrictions designed to minimize security risks:

The LAK system follows the principle of least privilege, ensuring that each key has only the minimum permissions necessary for its intended use.

Comprehensive Audit Logging

Every action taken through our system is logged in our database, providing complete visibility for you and our monitors into system usage.

Our audit logs capture comprehensive information about system usage, including:

This logging system allows users to monitor their account activity and provides administrators with tools to detect and investigate suspicious behavior.

Enterprise Security Infrastructure

We've implemented enterprise-grade security infrastructure that provides additional layers of protection at the application and server levels.

This infrastructure includes:

This infrastructure adds enterprise-grade security monitoring to our existing application-level protections.

To be clear, this isn't some hastily assembled system running on a budget cloud server. We've invested in proper enterprise infrastructure with the security considerations that domain management requires.

Security Limitations and Transparency

The Insider Threat Challenge

I must be transparent about a fundamental security limitation that exists in any service handling sensitive credentials: insider threats.

This represents a significant challenge that no purely technical solution can completely eliminate, as authorized personnel always have some level of access to systems.

This same insider threat exists at every registrar you currently use. When you register domain names at any registrar, their employees have access to your domain management capabilities.

What sets Nerve.io apart is our commitment to transparency and accountability in how we handle this responsibility.

My reputation in the domain industry depends on maintaining the trust of the community I've served for over two decades, and this personal accountability serves as an important safeguard.

Current Read-Only Operations

Nerve.io's current implementation is intentionally limited to read-only operations for security reasons.

This means:

This limitation significantly reduces the potential damage from compromised access while I develop more sophisticated security controls.

We will communicate with users about security updates and new features, allowing them to opt in or out of these communications while maintaining our security-first approach.

Database Security Considerations

While we use Google KMS for encryption, the encrypted data is still stored in our database.

This means:

What If We're Breached?

While we implement multiple layers of security, it's important to be transparent about what happens if those defenses are somehow compromised. Here's our detailed incident response and recovery plan:

Immediate Response (Within 1 Hour)

Credential Rotation: If a breach is detected, we immediately:

System Isolation: Compromised systems are immediately:

User Notification (Within 4 Hours)

Priority Communication: Affected users receive:

Transparent Reporting: We provide:

Recovery Support (Ongoing)

Dedicated Support Team: During recovery, users get:

Prevention of Future Incidents

Post-Incident Improvements: After any breach, we:

Future Security Enhancements

As Nerve.io prepares to implement create, update, and delete operations, I'm planning several security improvements to address current limitations.

External Audit Logging

I plan to implement immutable audit logging that sends security events to external services I don't control.

This system would:

Per-User KMS Keys

Instead of using a single KMS key for all users, I'm considering a system where each user gets their own encryption key.

This approach would:

Automated Key Rotation Policy

Our automated key rotation policy follows industry best practices for credential lifecycle management.

This ensures:

Regular Penetration Testing

We conduct regular penetration testing (pentests) of our entire system to proactively identify and fix security vulnerabilities before they can be exploited.

What is a Pentest?
A penetration test is a controlled, authorized attempt to hack into our systems using the same techniques and tools that real attackers would use. Our security team (or authorized third-party experts) systematically tries to find weaknesses in our:

Our Pentest Process:

I believe in "security through transparency." Regular pentesting is just one way I demonstrate my commitment to protecting your domain assets.

Nerve.io pentest on Labor Day 2025

Multi-Person Approval Workflows

For high-risk operations like registering, updating and deleting domain names, I'm designing approval systems that require multiple authorized individuals.

These workflows would:

Code Integrity Verification

I'm exploring code signing and verification systems to detect unauthorized modifications.

This would include:

Third-Party Security Audits

I plan to engage independent security firms to audit our systems and provide third-party validation.

These audits would:

Best Practices for Users

While we implement technical security measures, users also play a crucial role in maintaining security.

The account security practices we recommend are similar to what your registrars require – strong passwords, two-factor authentication, and regular access reviews. However, where registrars stop, we go much further with our advanced key management, comprehensive monitoring, and detailed reporting capabilities.

Account Security

Key Management

Monitoring and Reporting

Shared Responsibility Model

Security at Nerve.io operates on a shared responsibility model.

Nerve.io's Responsibilities

User Responsibilities

Compliance and Standards

I'm building our security architecture to meet various compliance requirements.

Industry Compliance

Our security practices and controls are designed to meet industry standards for data protection and security, with regular independent verification of our security practices.

Data Protection Standards

Our systems implement comprehensive data protection and privacy controls, including detailed logging of data access and modifications to ensure compliance with global privacy regulations.

Incident Response and Monitoring

Real-Time Security Monitoring

I have implemented continuous monitoring systems that detect and respond to security threats.

Nerve.io's monitoring includes:

Incident Response Procedures

When security incidents are detected, we follow established response procedures:

Business Continuity

Our security systems are designed to maintain service availability while protecting user assets.

This includes:

Security Through Transparency

Security at Nerve.io represents a comprehensive approach to protecting domain assets while maintaining transparency about our capabilities and limitations.

Our current architecture provides strong protection against external threats through Google KMS encryption, limited access keys, comprehensive audit logging, and WPMU DEV Defender Pro integration.

However, I acknowledge the fundamental challenge of insider threats and am actively developing additional safeguards as I expand our operational capabilities.

The key to our security approach is transparency, continuous improvement, and a commitment to building trust through demonstrated security practices rather than simply claiming to be secure.

As we move toward implementing create, update, and delete operations, we will continue to enhance our security architecture while maintaining the same level of transparency and user protection that defines our current approach.