For On-Prem Setup

Prerequisites

In order to use Hyperswitch for accepting digital payments through a consumer facing website or mobile application there are three main prerequisites

Resources

  • Account with cloud service provider (AWS/ GCP/Own Cloud) to host Hyperswitch application

  • Contractual relationship and active processing account with payment processor or acquirer (this will be in the form of API keys or merchant identifier)

Technical Know How

  • For deploying and managing application using Kubernetes

  • Handling a Web application written in Rust using Postgres (primary datastore), Redis (distributed key-value store for cached lookups), Prometheus/Grafana (monitoring), S3/CDN (serving static files)

Ensuring Compliance

Refer here to find out which level of PCI compliance applies to your business.

  • Report on Compliance (ROC): Engage an independent third-party Qualified Security Assessor (QSA) certified by the PCI-SSC to perform the PCI audit and share the findings. The ROC will be prepared by the QSA at the end of the PCI compliance activity. This is required only if your online business processes greater than 1 million card transactions per annum.

  • Quarterly Network scans: Engage an Approved Scanning Vendor for conducting quarterly network scans and submitting the scan reports to the payment processor/ acquirer

  • Self Assessment Questionnaire (SAQ): This is an assessment which can be self-completed by a business without engaging an Independent PCI Auditor, if your business processes less than 1 million card transactions per annum. A person responsible for the payment infrastructure within your organization fills out the SAQ. This could be the stakeholder who is the closest to your payment infrastructure - your Dev Ops Manager, or Information Security Officer, or CTO.

Here's a quick summary of everything you would need for going live with Hyperswitch:

Security

API Keys

Apple Pay Certificate

Deploying the Application

The above installation guides include vault as well, but you will need to activate the vault by following the steps mentioned in this guide.

Outgoing Proxy

  • Set up an outgoing proxy outside the Kubernetes cluster for all external communication originating from the Hyperswitch application.

  • Direct all outbound traffic through this proxy for monitoring and control purposes.

Incoming Traffic Management

  • Route incoming traffic to the Hyperswitch-server through an incoming proxy.

  • This proxy should handle traffic filtering(WAF), rate limiting, request validation, and integration with DDoS protection services before traffic reaches the Kubernetes cluster.

Hyperswitch does not share card BIN data automatically. BIN (Bank Identification Number) data helps identify the card issuer, card type, and country of issuance. This is available as an add-on service. Reach out to us at hyperswitch@juspay.in to access.

Monitoring

PCI Compliance

Connector Configurations

To access the PCI Attestation of Compliance (AOC) document on Hyperswitch, simply navigate to the Compliance section under settings in the Hyperswitch Dashboard. If you need further assistance, you can also email at hyperswitch@juspay.in

Integrate with your app

Secure your api-keys

Set up Webhooks

Secure your Payments

Error Handling

For more details, kindly refer to the state machine diagrams.

Customize and sanity check the payment experience

You are good to go to run Hyperswitch in production and provide your customers with a safe, reliable, and smooth payment experience.

Last updated

Was this helpful?