PaymentHub
Security & Compliance

Enterprise-Grade Security for Every Transaction.

PCI-aligned architecture, tokenization, RBAC, and audit trails \u2014 without adding scope or complexity.

PCI Architecture & Scope Minimization

PaymentHub is designed from the ground up to minimize your PCI scope. Card data never touches your ERP — it flows directly from the buyer to the payment gateway through tokenized APIs.

By keeping sensitive cardholder data outside your infrastructure, PaymentHub reduces the number of systems, networks, and processes subject to PCI DSS assessment. This means fewer controls to implement, fewer audits to manage, and a dramatically smaller compliance surface.

Our architecture aligns with PCI DSS v4.0 requirements, supporting SAQ-A eligibility for most deployment models. For organizations requiring deeper validation, PaymentHub provides all necessary documentation and architecture diagrams for your QSA.

Tokenization & Sensitive Data Handling

Every payment instrument processed through PaymentHub is immediately tokenized at the gateway level. The primary account number (PAN) is replaced with a non-reversible token before any data reaches your ERP or internal systems.

Tokenized references are stored in your ERP for reconciliation, refund processing, and audit purposes — but they carry zero value if intercepted. Sensitive data never persists in your application database, logs, or backups.

PaymentHub supports multi-gateway tokenization, meaning tokens are portable across supported gateways. This enables gateway switching and failover without re-collecting payment credentials from your customers.

Role-Based Access Control (RBAC)

PaymentHub enforces granular role-based access control across every entity and operation. Administrators define roles at the organization, business unit, and entity level — ensuring the principle of least privilege is applied consistently.

Roles govern access to payment operations (initiate, approve, void, refund), configuration settings (gateway rules, routing logic, fee schedules), and reporting (transaction views, reconciliation exports, audit logs).

Entity-level permissions mean a user with access to one business unit cannot view or act on payment data from another. Combined with mandatory session timeouts and IP allowlisting, RBAC ensures tight control over who can do what, and where.

Immutable Audit Trails

Every posting event, status change, and user action in PaymentHub is captured in an immutable audit log. These logs cannot be edited or deleted — not even by administrators.

Audit entries include the actor (user or system), the action performed, the affected entity, a before/after state snapshot, a timestamp, and the originating IP address. This makes every transaction fully traceable from initiation through settlement and reconciliation.

Audit data is available for export in structured formats (CSV, JSON) and can be fed into your SIEM or compliance reporting tools. PaymentHub also provides built-in reconciliation audit support, flagging discrepancies between ERP postings and gateway settlement records.

API Security

All PaymentHub APIs are secured with OAuth 2.0 bearer tokens. API keys support automatic rotation on configurable schedules, and revoked keys are invalidated immediately across all edge nodes.

Rate limiting is enforced per-client and per-endpoint to prevent abuse, brute-force attacks, and accidental runaway integrations. Webhook callbacks are signed with HMAC-SHA256, and PaymentHub provides verification utilities for all supported languages.

All API traffic is encrypted in transit via TLS 1.2+ with modern cipher suites. Certificate pinning is supported for enterprise integrations requiring additional transport-layer assurance.

Extension Sandboxing

PaymentHub allows customization through hooks, overrides, and workflow extensions — but every custom extension runs in a sandboxed execution environment isolated from the core payment engine.

Sandboxed extensions cannot access raw card data, gateway credentials, or other tenants’ data. They operate on post-tokenized, scoped payloads and are subject to resource limits (CPU, memory, execution time) to prevent denial-of-service scenarios.

This architecture lets your team extend PaymentHub’s behavior — custom fee calculations, conditional routing logic, approval workflows — without introducing PCI scope or compromising the security posture of the core platform.

Security at a Glance

PCI scope minimization via gateway-level tokenization
No raw card data in your ERP, database, or logs
Granular RBAC with entity-level permissions
Immutable, tamper-proof audit logs
OAuth 2.0 + automatic API key rotation
Webhook HMAC-SHA256 signature verification
TLS 1.2+ for all API traffic
Sandboxed extension runtime for custom logic

Security & Compliance \u2014 FAQs

Ready to see PaymentHub's security architecture in action?

Book a Payments Blueprint call and we'll walk through your specific compliance requirements, gateway stack, and ERP environment.