Netcore Platform Security

At Netcore, security is foundational to how we design, build, and operate our platform. As a trusted partner for enterprises managing customer engagement and data, we implement a robust set of security controls across identity, access, data protection, and operational workflows.

This document serves as a centralized reference for Netcore’s security features and practices. Each section outlines a specific control or mechanism used to ensure the confidentiality, integrity, and availability of customer data.

Included Security Modules:

Sensitive data fields such as phone numbers, emails, and addresses are masked in logs, UIs, and reports to prevent unauthorized visibility while preserving usability for approved roles.

2FA adds an extra layer of identity verification for platform logins, significantly reducing the risk of unauthorized access from credential compromise.

  • IP-Based Login Restrictions

Account Admins can define allowed IP ranges for user logins, ensuring that only users accessing from trusted networks can authenticate, from Account Configuration section.

Netcore integrates with enterprise identity providers (IdPs) using SAML 2.0 or OAuth, allowing users to authenticate using existing corporate credentials and reducing password sprawl.

Permissions are managed based on user roles. Each user is assigned granular access to features and data based on their responsibilities, minimizing risk from over-privileged accounts.

For high-risk operations, Netcore supports maker-checker approval flows—ensuring that one user initiates a change and another independently approves it.

  • Bring Your Own Key (BYOK)

Enterprises can encrypt their data using customer-managed encryption keys stored in their own AWS KMS accounts. This provides full control, auditability, and compliance alignment for data-at-rest encryption.