Security and Compliance
Data Protection & Encryption
Data protection and encryption are critical for a Hyperswitch production installation to safeguard sensitive information and comply with GDPR, PCI DSS requirements.
It is recommended to ensure that
Database storage layer encryption at rest is enabled to secure cardholder data
TLS 1.2 or higher is enforced for all data in transit
Data residency requirements of the country of payment processing is adhered to
Encryption at Rest
All storage layers containing sensitive or transactional data should enforce encryption at rest.
Recommended controls include:
Database storage layer encryption enabled for all persistent data stores.
Encryption applied to backups and database snapshots.
Encryption enabled for object storage used for logs, analytics, or archival data.
These measures ensure that stored data remains protected even if underlying storage media is compromised.
Encryption in Transit
All service-to-service and external communications must enforce secure transport protocols.
Recommended baseline requirements:
TLS 1.2 or higher must be enforced for all data in transit.
Internal service communication should use secure service endpoints or service mesh encryption where available.
TLS certificates should be issued and rotated automatically using certificate management tools.
This ensures confidentiality and integrity of data transmitted between services and external systems.
Card Vault Isolation
The Hyperswitch Card Vault must be deployed in a separate compute environment and storage layer to isolate sensitive cardholder data and encryption keys from the main application infrastructure.
Recommended controls include:
Separate infrastructure instances
Dedicated storage volumes
Independent encryption key management
restricted operational access
Key Custodian Model
Operational access to encryption keys should follow a key custodian model, where access to sensitive cryptographic material is restricted to designated security personnel.
This ensures compliance with common payment security frameworks and reduces the risk of unauthorized key access.
Monitoring & Security Alerts
Continuous monitoring and real-time alerting are critical for detecting unauthorized activity and maintaining operational visibility.
Centralized Logging and SIEM Integration
Production environments should integrate with a Security Information and Event Management (SIEM) platform or centralized logging system to collect and analyze security-relevant events.
Recommended capabilities include:
Aggregation of application logs, system logs, and infrastructure logs
Correlation of events across services
Detection of suspicious activity patterns
Real-Time Security Alerts
Real-time alerting should be configured for security-sensitive events, including:
Unauthorized access attempts
Repeated authentication failures
Privilege escalation attempts
Unexpected data access patterns
Configuration changes affecting security controls
Alerts should integrate with incident management or on-call systems to ensure timely response.
Log Integrity and Audit Protection
Logs and audit trails must be protected against tampering to ensure reliable forensic investigation.
Recommended practices include:
Regular integrity verification of log data
Write-once or immutable storage for audit logs
Restricted access controls for log storage systems
These safeguards help preserve the reliability of security and operational audit records.
File Integrity Monitoring (FIM)
File Integrity Monitoring should be enabled for critical system components.
FIM solutions track changes to important system files and configuration artifacts, allowing operators to detect unauthorized modifications.
Recommended monitoring targets include:
system binaries
application configuration files
security policies
authentication and authorization configurations
Unexpected file changes should trigger alerts for security review.
Access Control & User Management
It is recommended to ensure the following in the merchant’s Hyperswitch production setup.
Role Based Access Control or Least privilege access is enforced for all system users.
MFA is enabled for all administrative access.
Strict access control for production data—only authorized personnel have access.
Penetration testing automation
Frequent penetration testing is critical for PCI DSS compliance applications due to its role in identifying vulnerabilities, preventing breaches, and ensuring continuous security.
PCI DSS requires annual penetration tests for all systems in the Cardholder Data Environment (CDE).
To maintain rigor in conducting more frequent penetration tests, it is recommended to automate the penetration test on a weekly basis using tools like Qualys or Nessus perform scheduled network and application scans, ensuring continuous monitoring.
Incident Response & Disaster Recovery
To minimize operational disruption and ensure regulatory compliance it is recommended to ensure the below:
Incident response plans are documented and tested periodically.
Data backup and recovery processes are in place and tested regularly.
Failover and redundancy mechanisms are in place for high availability.
PCI compliance audit
Businesses subject to PCI-DSS must annually demonstrate compliance with the regulation. And PCI-DSS lays out two ways of doing so:
Self-Assessment Questionnaire (SAQ): This is an audit or assessment which can be completed by a business without an independent third-party Qualified Security Assessor (QSA) or an Internal Security Assessor (ISA). The person responsible for the payment infrastructure fills out the SAQ. This could be the stakeholder who is the closest to your payment infrastructure - your Dev Ops Manager, or Information Security Officer, or CTO.
Report on Compliance (ROC): An independent third-party QSA or ISA certified by the PCI-SSC will have to perform the audit and share the findings.
Depending on the number of card transactions your business processes, you could be subject to different levels of PCI compliance.

Source: Mastercard guidelines, Visa Guidelines, PCI SSC document library.
For PCI DSS Level 1 compliance the merchant shall engage with a Third party QSA approved by the PCI council. The PCI compliance certification shall be done annually, and to produce the SAQ and ROC artefacts.
Comparatively PCI Level 2, Level 3 and Level 4 may be completed with a self assessment.
Last updated
Was this helpful?

