For On-Prem Setup
Prerequisites
In order to use Hyperswitch for accepting digital payments through a consumer facing website or mobile application there are three main prerequisites
Resources
Account with cloud service provider (AWS/ GCP/Own Cloud) to host Hyperswitch application
Contractual relationship and active processing account with payment processor or acquirer (this will be in the form of API keys or merchant identifier)
Technical Know How
For deploying and managing application using Kubernetes
Handling a Web application written in Rust using Postgres (primary datastore), Redis (distributed key-value store for cached lookups), Prometheus/Grafana (monitoring), S3/CDN (serving static files)
Ensuring Compliance
Refer here to find out which level of PCI compliance applies to your business.
Report on Compliance (ROC): Engage an independent third-party Qualified Security Assessor (QSA) certified by the PCI-SSC to perform the PCI audit and share the findings. The ROC will be prepared by the QSA at the end of the PCI compliance activity. This is required only if your online business processes greater than 1 million card transactions per annum.
Quarterly Network scans: Engage an Approved Scanning Vendor for conducting quarterly network scans and submitting the scan reports to the payment processor/ acquirer
Self Assessment Questionnaire (SAQ): This is an assessment which can be self-completed by a business without engaging an Independent PCI Auditor, if your business processes less than 1 million card transactions per annum. A person responsible for the payment infrastructure within your organization fills out the SAQ. This could be the stakeholder who is the closest to your payment infrastructure - your Dev Ops Manager, or Information Security Officer, or CTO.
Here's a quick summary of everything you would need for going live with Hyperswitch:
Security
API Keys
Apple Pay Certificate
Deploying the Application
The above installation guides include vault as well, but you will need to activate the vault by following the steps mentioned in this guide.
Outgoing Proxy
Set up an outgoing proxy outside the Kubernetes cluster for all external communication originating from the Hyperswitch application.
Direct all outbound traffic through this proxy for monitoring and control purposes.
Incoming Traffic Management
Route incoming traffic to the Hyperswitch-server through an incoming proxy.
This proxy should handle traffic filtering(WAF), rate limiting, request validation, and integration with DDoS protection services before traffic reaches the Kubernetes cluster.
Hyperswitch does not share card BIN data automatically. BIN (Bank Identification Number) data helps identify the card issuer, card type, and country of issuance. This is available as an add-on service. Reach out to us at hyperswitch@juspay.in to access.
Monitoring
PCI Compliance
Connector Configurations
To access the PCI Attestation of Compliance (AOC) document on Hyperswitch, simply navigate to the Compliance section under settings in the Hyperswitch Dashboard. If you need further assistance, you can also email at hyperswitch@juspay.in
Integrate with your app
Secure your api-keys
Set up Webhooks
Secure your Payments
Error Handling
For more details, kindly refer to the state machine diagrams.
Customize and sanity check the payment experience
You are good to go to run Hyperswitch in production and provide your customers with a safe, reliable, and smooth payment experience.
Last updated
Was this helpful?