All Systems Operational

Security is
Not an Option.
It's Our Foundation.

Every transaction on Paylogic is protected by military-grade encryption, real-time fraud monitoring, and a compliance framework built to exceed RBI, PCI DSS, and ISO standards. Your money and data are always safe.

Certified & Audited By

PCI DSS Level 1
ISO 27001
RBI Compliant
256-bit TLS/AES
DPDP Ready
SOC 2 Type II
0%
Platform Uptime SLA
<2s
Avg Transaction Speed
0-bit
Encryption Standard
0/7
Security Monitoring

Audited to the Highest Standards

Paylogic undergoes rigorous annual audits by independent third-party assessors. Every certification is maintained, renewed, and monitored continuously.

Global Standard · Annual QSA Audit

PCI DSS Level 1

The highest tier of the Payment Card Industry Data Security Standard. Our Level 1 certification is audited annually by a Qualified Security Assessor (QSA), covering all cardholder data environments, network segmentation, and transaction pipelines.

Certified & Valid — 2025
Information Security · ISMS

ISO/IEC 27001:2022

International standard for Information Security Management Systems. Covers risk assessment, access control, cryptography, physical security, incident management, and business continuity across our entire organisation and infrastructure.

Certified & Valid — 2025
Payment Aggregator · RBI Guidelines

RBI PA Licence

We have initiated the formal RBI Payment Aggregator licence application under the Master Directions on PA/PG (2020). KYC norms, data localisation, tokenisation, and prohibited category enforcement are already in place while the licence process progresses.

Licence Application — In Progress
Cloud Security · AICPA Framework

SOC 2 Type II

Service Organization Control 2 Type II report covering Security, Availability, and Confidentiality trust service criteria. Our auditors review controls over a 12-month observation period — not just a point-in-time snapshot.

Report Available on NDA
Data Privacy · DPDP Act 2023 + GDPR

GDPR & DPDP Ready

Aligned with India's Digital Personal Data Protection Act 2023 and applicable GDPR requirements. Data minimisation, purpose limitation, consent management, and data subject rights are embedded into our platform by design.

Privacy-by-Design Architecture
Penetration Testing · CERT-In

Annual Pen Testing

We engage CERT-In empanelled security firms for comprehensive penetration testing twice a year — covering application layer, API, network, and social engineering vectors. All critical findings are resolved within 72 hours of discovery.

Last Tested: Q1 2025
End-to-End Encryption Flow
Customer Browser / App
TLS 1.3 initiated
⬇ TLS 1.3 Handshake · Certificate Pinning
Paylogic Edge / CDN Layer
DDoS mitigation · WAF · Rate limiting
⬇ mTLS · Internal Certificate Authority
Payment Processing Engine
Tokenisation · Fraud scoring · Auth
⬇ AES-256-GCM Encrypted Storage
Encrypted Data Stores
At-rest encryption · Field-level crypto
⬇ HSM Key Management
Hardware Security Module (HSM)
FIPS 140-2 Level 3 · Key rotation

Encryption at Every Layer

From the moment a user initiates a transaction to the nanosecond it's stored in our database, every byte of sensitive data travels through multiple layers of military-grade encryption.

TLS 1.3 — Latest Protocol Only

All client connections use TLS 1.3 exclusively. Legacy protocols (TLS 1.0, 1.1, SSL) are permanently disabled. Certificate pinning is enforced in our mobile SDKs.

AES-256-GCM At Rest

All sensitive data at rest — PAN, account numbers, KYC documents — is encrypted with AES-256-GCM. Encryption keys are stored in FIPS 140-2 Level 3 validated Hardware Security Modules (HSMs), never in software.

Tokenisation

All card numbers and sensitive payment credentials are immediately tokenised on receipt. The original PAN is never stored in our application layer — only a non-reversible token that is useless outside our HSM boundary.

WAF + DDoS Protection

A multi-layer Web Application Firewall (WAF) with OWASP Top 10 rulesets, geo-filtering, and real-time DDoS mitigation — capable of absorbing 1Tbps+ attack vectors at the edge.

Defence in Depth

A multi-layered security architecture that detects, prevents, and responds to threats before they can impact your business or your customers.

AI Fraud Detection

Machine learning models analyse 200+ transaction signals in real time to detect anomalies, velocity attacks, and suspicious patterns — flagging fraud in under 50ms.

24/7 SOC Monitoring

Our Security Operations Centre operates around the clock. Alerts are triaged and responded to in minutes — not hours. Mean Time to Respond (MTTR) is under 12 minutes.

RBAC & Zero Trust

Role-Based Access Control with Zero Trust principles — every internal service call is authenticated and authorised. No implicit trust, even within our own network perimeter.

Intrusion Detection

Network-level IDS/IPS with behavioural baselining. Anomalous traffic patterns, privilege escalation attempts, and lateral movement are automatically contained.

Secrets Management

All API keys, database credentials, and certificates are managed in a centralised Vault (HashiCorp). Dynamic, short-lived secrets eliminate the risk of credential leaks.

MFA Everywhere

Multi-Factor Authentication is mandatory for all Merchant dashboard access, all internal employee logins, and all privileged infrastructure access — no exceptions.

Geo-Fencing & IP Reputation

Real-time IP reputation scoring, geographic velocity checks, and proxy/VPN detection help prevent account takeovers and fraudulent API calls from compromised endpoints.

Immutable Audit Logs

Every action on the Platform generates a tamper-proof audit trail stored in WORM (Write Once Read Many) storage, enabling forensic investigation, regulatory reporting, and compliance audits.

Built for India's Regulatory Landscape

Paylogic is designed from the ground up to comply with every regulation governing fintech operations in India — and we stay ahead of every regulatory change.

In Progress

RBI Payment Aggregator Licence — Coming Soon

Paylogic has initiated the formal application process for the RBI Payment Aggregator (PA) Licence under the RBI's Master Directions on Payment Aggregators and Payment Gateways (March 2020 & subsequent amendments). We are actively working through the regulatory requirements and expect to receive our formal licence approval in due course.

  • Merchant onboarding KYC aligned to RBI guidelines
  • Data localisation — all transaction data stored in India only
  • Prohibited merchant category enforcement active
  • Tokenisation (Card-on-File) — implemented per RBI directive
  • OTP / 2FA authentication enforced on all transactions
  • Chargeback dispute management process operational
RBI PA Licence — Application In Progress
PA-PG Master Directions — Formal Compliance
Nodal / Escrow Account — Setup in Progress
Net Worth Certification — Under Review
T+1 Settlement Reporting to RBI — Pending
We are committed to full RBI compliance and are working diligently through the PA licence process. All existing operations are conducted in line with applicable payment services guidelines.

AML, KYC & PMLA Compliance

Our Anti-Money Laundering programme is designed to meet the full requirements of the Prevention of Money Laundering Act, 2002 (PMLA), FATF recommendations, and the Financial Intelligence Unit – India (FIU-IND) reporting obligations.

Every merchant undergoes risk-tiered KYC during onboarding. Transactions are monitored continuously against watch lists, behavioural baselines, and suspicious activity thresholds.

  • FIU-IND registered reporting entity
  • Risk-tiered KYC — Simplified, Regular, Enhanced Due Diligence
  • Screening against UNSC, OFAC, EU, and domestic sanctions lists
  • Real-time suspicious transaction monitoring and STR filing
  • 5-year KYC and transaction record retention
  • Politically Exposed Person (PEP) screening
AML Controls Checklist
FIU-IND Registered Entity
Risk-Based KYC Framework
PEP & Sanctions Screening
Suspicious Transaction Reporting
Cash Transaction Reporting (CTR)
Beneficial Ownership Verification
5-Year Record Retention
AML Officer Designated

Digital Personal Data Protection & GDPR

Paylogic's data architecture is built on Privacy by Design principles, ensuring full alignment with India's Digital Personal Data Protection Act, 2023 (DPDP) and applicable GDPR provisions for cross-border data flows.

We operate as a Data Fiduciary under DPDP and maintain detailed records of processing activities, data subject consent, and fulfilment of data principal rights.

  • Data Fiduciary obligations fully implemented
  • Explicit consent management for all non-essential processing
  • Data minimisation and purpose limitation by design
  • Data Principal rights — access, correction, erasure, portability
  • 72-hour breach notification readiness
  • No cross-border transfer without adequate safeguards
DPDP Compliance Checklist
Privacy by Design Architecture
Consent Management System
Data Minimisation Policy
Data Subject Rights Portal
DPA / ROPA Maintained
Breach Response Plan — Active
Children's Data Protection
Data Residency — India Only

NPCI, UPI & Payments Ecosystem Standards

As a certified participant in India's payment ecosystem, Paylogic adheres to all NPCI operational guidelines, UPI circular requirements, and payment scheme rules for Visa, Mastercard, and RuPay networks.

Our UPI integration is built on the latest NPCI API specification with daily reconciliation, dispute management, and settlement reporting built into our core systems.

  • NPCI certified member bank technology partner
  • UPI 2.0 with One-Time Mandates (OTM) support
  • RuPay, Visa, Mastercard network compliance
  • Daily NPV and settlement reconciliation
  • Card Tokenisation (CoFT) implemented per NPCI directive
  • UPI Lite and UPI Circle compliance ready
NPCI / Network Checklist
NPCI Certified Partner
UPI 2.0 Compliant
Card-on-File Tokenisation
Daily Recon & Settlement
RuPay Network Compliant
NACH / e-NACH Active
Chargeback SLA Met
3D Secure 2.0 Enforced

CERT-In Compliance & Incident Reporting

Paylogic is registered with the Indian Computer Emergency Response Team (CERT-In) and fully compliant with the CERT-In Directions (April 2022) under Section 70B of the IT Act — including mandatory incident reporting within 6 hours, log retention for 180 days, and ICT infrastructure synchronisation.

Our pen tests are conducted by CERT-In empanelled security firms and our incident response team is trained to the CERT-In response playbook.

  • CERT-In registered organisation
  • 6-hour mandatory incident reporting — process active
  • 180-day log retention policy implemented
  • NTP synchronisation to NIC/NPLI time servers
  • Annual pen test by CERT-In empanelled firm
  • VPN, remote access & cloud logging compliant
CERT-In Compliance Checklist
CERT-In Registered
6-Hour Incident Reporting
180-Day Log Retention
NTP Time Sync — Implemented
Annual Pen Test Done
VPN Log Retention Active
Cloud Account Logging
ICT Asset Inventory Maintained

99.99% Uptime. Every Month.

Our multi-region active-active infrastructure ensures near-zero downtime. We publish real-time status and uptime data transparently.

Last 12 Months — Platform Uptime
All Systems Go
JunJulAugSep OctNovDecJan FebMarAprMay
99.99%
Rolling 12-Month Uptime Average
Payment Gateway
99.99%
Payout API
99.98%
Verification Suite
99.97%
Dashboard & Reporting
99.95%

Multi-Region Active-Active

Traffic is distributed across multiple availability zones. A failure in one region is transparently failed over in under 30 seconds with no data loss.

Zero-Downtime Deployments

Blue-green and canary deployment pipelines allow us to roll out updates and patches with no service interruptions during business hours.

RPO <1 min · RTO <5 min

Recovery Point Objective under 1 minute and Recovery Time Objective under 5 minutes — backed by continuous database replication and automated failover.

Proactive Incident Communication

Status page updated within 5 minutes of any incident. Merchants are notified via email and webhook within 10 minutes. Post-incident RCAs published within 48 hours.

SLA Credits for Downtime

If we fall below our 99.9% monthly SLA commitment, Merchants are automatically eligible for service credits — no need to file a claim.

Your Data Stays in India

All payment data, KYC records, and transaction logs are stored exclusively within Indian data centres, fully compliant with RBI data localisation requirements and the DPDP Act.

100% India-Based Storage

Every piece of sensitive payment data — transaction records, KYC documents, bank details, and cardholder data — is stored exclusively in TIER III+ data centres located within India.

Mumbai DC Pune DR Chennai Backup

Tier III+ Data Centres

Our primary and disaster recovery data centres hold Tier III+ Uptime Institute certification — providing 99.982% availability with N+1 redundancy for all critical infrastructure components.

Uptime Tier III+ ISO 27001 DC 24/7 Physical Security

Geo-Redundant Replication

Data is synchronously replicated to a geographically separate DR site in real time. In the event of a primary site failure, automated failover occurs with zero data loss and minimal service disruption.

Sync Replication RPO <1 min Auto Failover

Found a Vulnerability? Tell Us First.

We value and reward the security community. If you've discovered a potential security issue in Paylogic's systems, please report it responsibly and we'll work with you to fix it.

Our responsible disclosure process is designed to be transparent, respectful, and rewarding for genuine researchers. We do not pursue legal action against researchers who follow this process in good faith.

1

Discover & Document

Document the vulnerability clearly — include steps to reproduce, scope, and potential impact. Do not exploit or access data beyond what is needed to demonstrate the issue.

2

Submit Securely

Email your report to security@paylogic.in using our PGP public key. Include proof-of-concept, affected endpoints, and your contact details for follow-up.

3

We Acknowledge Within 24h

Our security team will acknowledge your report within 24 hours and provide a unique tracking reference. We keep you updated as the issue is triaged and investigated.

4

Fix & Reward

Critical vulnerabilities are patched within 72 hours. Upon fix, we provide a bounty reward based on CVSS severity rating — from ₹5,000 for Low to ₹2,00,000+ for Critical findings.

5

Credit & Hall of Fame

With your permission, we'll credit you in our Security Hall of Fame and publish a summary disclosure after the vulnerability is patched — giving you the recognition you deserve.

Security Disclosure

Bug Bounty & Vulnerability Reports

Response: Within 24 hours
20th Floor, Oberoi Commerz II, Goregaon East, Mumbai – 400063
PGP Public Key Fingerprint
8F3A 2B91 C4D7 E050 F8A2
3910 B5C2 7843 AF91 D4E6
2C7F 9A18 6B40 3D52 E871
Full key available at paylogic.in/.well-known/security.txt
Bounty Scale
🔴 Critical (CVSS 9–10) ₹1L – ₹2L+
🟠 High (CVSS 7–8.9) ₹25K – ₹1L
🔵 Medium (CVSS 4–6.9) ₹5K – ₹25K
🟢 Low (CVSS 0.1–3.9) Hall of Fame

Security You Can Trust.
Infrastructure Built to Last.

Join 10,000+ businesses who trust Paylogic to secure every payment, every payout, and every piece of their financial data.