Security & compliance

Security and compliance, engineered in from day one.

Paytone is built for the realities of regulated payment infrastructure. Sensitive data is isolated, traffic is monitored continuously, and the platform is structured to meet the controls auditors actually ask about — without slowing your team down.

Our security model

Defense in depth across every layer.

From the hardware boundary up to the transaction API, every layer is built with isolation, observability, and least-privilege in mind. Here's what that looks like in practice.

Hardened infrastructure

Sensitive payment data is isolated and encrypted in transit and at rest, with least-privilege IAM across every service and dedicated environments for production workloads.

Continuous fraud monitoring

Behavioral, velocity, and network signals are analyzed in real time, with rules you can tune to fit your risk appetite and a full audit trail on every decision the engine makes.

Transaction risk checks

Every transaction is scored with built-in heuristics and routed, challenged, or blocked based on the outcome. Decisions are logged immutably and exportable for review.

Data protection

GDPR-aligned data handling, region-scoped storage where required by regulation, and customer-controlled retention policies for transactional and personal data.

Compliance posture

Designed to meet the controls that matter.

Compliance is a moving target. We've built the platform to satisfy the controls that auditors, partner banks, and acquirers actually verify — and we publish our posture honestly.

Hardened payment infrastructure
3-D Secure 2
Tokenized PAN storage
SSO & granular roles
GDPR-aligned data handling
Cardholder data
Card PANs are tokenized at the network edge and never stored in your application environment. Only the systems that must process raw card data ever see it, and those systems are tightly scoped, isolated, and continuously monitored.
GDPR
Data processing agreements available on request. Personal data is region-scoped, retention is customer-configurable, and subject-access requests are supported through documented workflows.
Operational controls
Documented controls cover access management, change control, vendor risk, and incident response — reviewed regularly and shared with regulated counterparties under NDA.
Audit & assurance
Annual third-party penetration testing, continuous vulnerability scanning, and a documented evidence pack we share with regulated counterparties on request.
How we handle data

Customer data, treated like the liability it is.

The less data we hold, the less can ever be lost. Where we must retain information, it's encrypted, scoped, and auditable end-to-end.

Encryption in transit

All API and webhook traffic uses TLS 1.2+ with modern cipher suites. Internal service-to-service traffic is encrypted by default on private networks.

Encryption at rest

Data stores use AES-256 encryption with managed keys. Sensitive fields are additionally protected with envelope encryption and rotated keys.

Tokenization

Card PANs are replaced with provider-agnostic tokens at the network edge. Your systems only ever see references, never the underlying card data.

Region-scoped storage

Choose where personal data is processed and stored. EU, UK, and other regional regions available for customers with data-residency requirements.

Retention controls

Configure how long transactional and personal data is retained. Deletion is verified, logged, and supports right-to-erasure requests under GDPR.

Access logging

Every administrative and API action is logged with actor, timestamp, and scope. Logs are tamper-evident and exportable to your SIEM of choice.

Incident response

A practiced runbook, not a hope.

When something goes wrong — and at some point, in payments, something always does — there is a documented, rehearsed process. Customers are not an afterthought in it.

  1. 01 · DETECT

    Detect

    Anomaly detection, integrity monitoring, and 24/7 on-call engineering catch incidents fast, often before they're customer-visible.

  2. 02 · CONTAIN

    Contain

    Affected systems are isolated, blast radius is bounded, and standby capacity takes over wherever the architecture supports failover.

  3. 03 · COMMUNICATE

    Communicate

    Affected customers are notified through agreed channels with technical detail, expected timelines, and a named point of contact — not boilerplate.

  4. 04 · REMEDIATE

    Remediate

    Root cause analysis, remediation, and a published post-incident report. Findings drive durable changes, not just a checked box.

Responsible disclosure

Bug bounty & responsible disclosure.

If you've found a security issue in Paytone, we want to hear from you. We operate a private bug bounty programme with rewards scaled to severity, and we commit to a same-business-day acknowledgement on every report received in good faith.

Send vulnerability reports to security@paytone.io with reproduction steps and impact. PGP-encrypted submissions accepted. We will not pursue legal action against researchers acting in good faith under our disclosure policy.

Report a security issue

Send full reproduction details and we'll get back to you within one business day.

Talk to security

Need a deeper look under the hood?

Procurement, infosec, and risk teams: we share evidence packs, control mappings, and architecture documentation under NDA. Get in touch and we'll route you to the right person.