4.2 Security
Security in Hyperswitch is built as a foundational layer and since the system operates directly on the critical payment path and handles highly sensitive financial data, the architecture is designed to minimize exposure, enforce strict data boundaries, and apply encryption at every stage of the data lifecycle.
PCI-SSS Certified (Not Just PCI-DSS)
Hyperswitch is PCI-SSS (PCI Secure Software Standard) validated. This goes beyond infrastructure-level PCI-DSS compliance and validates the software itself against stringent secure development and software lifecycle standards defined by the PCI Security Standards Council.
PCI-SSS certification ensures:
Secure software development practices
Controlled cryptographic implementations
Protection against common software vulnerabilities
Secure configuration and deployment guidelines
This gives merchants confidence that the payment software layer itself adheres to globally recognized payment security standards.
Reduced Exposure of Sensitive Information
A key security principle in Hyperswitch is minimizing the exposure of sensitive payment data across the system.
Sensitive information is carefully controlled across:
Application Logs
Merchant Control Center (Dashboard)
API Responses
Card numbers, CVV, expiry, and other sensitive fields are masked or redacted before being logged, surfaced in dashboards, or returned in responses. Only masked representations (such as last4) are visible where required.
In addition, asynchronous post-facto scanning mechanisms using regex-based pattern detection help identify and flag any accidental leakage of sensitive data in logs or events. This provides an additional safety net beyond preventive controls.
The goal is simple: sensitive data should never travel further than absolutely necessary.
Encryption at Every Stage

Hyperswitch enforces encryption both in transit and at rest, ensuring protection across the entire data flow.
Data-in-Transit Encryption
All communication between components is encrypted using:
TLS encryption for secure transport
JWE/JWS encryption for payload-level cryptographic protection
When card data is accepted through the Client SDK (web/mobile), it is encrypted before transmission. Communication between the client, backend services, vault, and external connectors is secured using SSL/TLS. In certain flows, JWE/JWS adds an additional layer of application-level encryption.
Data-at-Rest Encryption
Once stored, sensitive data remains encrypted using multiple layers:
Application-level AES encryption
Database-level encryption
Multi-layer encryption inside the PCU Card Vault
Encrypted Vault database with master/replica storage
Card data is isolated within the Card Vault service and never stored in plaintext in application databases. Even internal services only operate on encrypted representations or tokens.
Secure Data Flow Design
The overall design ensures:
Card data is accepted securely via the Client SDK.
It is encrypted in transit to the backend.
It is stored in the dedicated Card Vault service.
The vault database enforces additional encryption layers.
Downstream services operate on tokens, not raw card data.
This layered approach ensures compliance with strict regulatory and industry standards.
Last updated