Security Architecture

Enterprise-Grade Security

Every layer of PCI Proxy EU is engineered to protect cardholder data, from FIPS 140-2 Level 3 hardware security modules to AES-256 encryption at rest, TLS 1.3 in transit, and 24/7 threat monitoring across European data centres.

PCI DSS LEVEL 1 CERTIFIED
Certification

PCI DSS Level 1 Certified

The most stringent tier - applied to organisations handling over six million card transactions per year and requiring the highest bar of security controls.

Annual QSA Audit

On-site audit by a Qualified Security Assessor every year. The resulting Report on Compliance is submitted to card networks, confirming adherence to all 300+ PCI DSS controls.

Quarterly ASV Scans

Approved Scanning Vendors probe all public-facing IPs and domains quarterly. Any finding above CVSS 4.0 must be remediated before the next scan window opens.

Attestation of Compliance

Our AoC is available for customers to reference in their own assessments. Because we handle the cardholder data environment, your PCI scope is reduced dramatically.

Data Residency

European Data Residency

All cardholder data processed by PCI Proxy EU is stored exclusively within the European Union. No card data is ever transferred to, processed in, or replicated outside EU borders, ensuring full compliance with GDPR and data sovereignty requirements.

GDPR-Compliant by Design

Our infrastructure is architected to meet every requirement of the General Data Protection Regulation. Data processing agreements, data protection impact assessments, and lawful bases for processing are built into our operational framework from day one.

Tier IV Data Centres

Our primary and disaster-recovery data centres are located in Germany and the Netherlands, operating at Tier IV availability (99.995% uptime). Each facility features redundant power, cooling, and network connectivity with physically separated fire zones.

No Third-Country Transfers

We do not use cloud sub-processors based outside the EU for cardholder data operations. All encryption keys, tokenization mappings, and audit logs remain within EU jurisdiction, eliminating Schrems II transfer risk entirely.

Data Residency Guarantee

All card data stored in EU data centres only
Encryption keys generated and held within the EU
GDPR Article 28 compliant DPA available
No Schrems II transfer risks
Disaster recovery within EU borders
Encryption

Multi-Layer Encryption

Cardholder data is encrypted at rest and in transit using industry-leading algorithms. No unencrypted card data ever exists outside the HSM boundary.

01

AES-256 at Rest

GCM Mode

All stored cardholder data is encrypted using AES-256-GCM. Individual PANs are encrypted with unique data encryption keys (DEKs), wrapped by a master key stored inside the HSM - envelope encryption ensuring no key material ever exists in plaintext.

02

TLS 1.3 in Transit

ECDHE Forward Secrecy

Every connection uses TLS 1.3 exclusively. Older protocol versions (TLS 1.0, 1.1, 1.2) are disabled. ECDHE key exchange enforces forward secrecy - past session data stays protected even if a long-term key is later compromised.

03

Key Rotation Policies

Zero Downtime

Master encryption keys rotate annually as mandated by PCI DSS. DEKs rotate on demand or on a configurable schedule. During rotation, all ciphertexts are re-encrypted transparently - no downtime, no API changes for your integration.

AES-256

Encryption Standard

TLS 1.3

Transport Protocol

Annual

Key Rotation

Hardware Security

Hardware Security Modules (HSM)

At the heart of PCI Proxy EU's cryptographic operations sit FIPS 140-2 Level 3 certified HSMs, dedicated tamper-evident hardware appliances that generate, store, and manage encryption keys in a physically isolated environment.

FIPS 140-2 Level 3

Our HSMs meet FIPS 140-2 Level 3, which requires physical tamper-evidence mechanisms, identity-based authentication, and a clear separation between interfaces that input and output critical security parameters. Any attempt to physically penetrate the device triggers automatic key zeroisation.

Key Management Lifecycle

Keys are generated inside the HSM using a certified true random number generator (TRNG). They are never exported in plaintext. The full lifecycle, generation, distribution, storage, rotation, and destruction, occurs within the HSM's cryptographic boundary.

Tamper-Evident Hardware

Each HSM is housed in a tamper-evident enclosure with active anti-tamper meshes, temperature sensors, and voltage monitors. If any environmental parameter moves outside the defined operational range, all stored key material is irreversibly destroyed.

HSM in the Architecture

Incoming API Request (TLS 1.3)
PCI Proxy Tokenization Engine PAN extraction & token generation
HSM (FIPS 140-2 L3) Key generation, encryption, decryption
Encrypted Vault (AES-256) PAN stored encrypted, keys in HSM only
Fraud Prevention

Real-Time Fraud Prevention

Beyond encryption and tokenization, PCI Proxy EU applies multiple layers of fraud detection to every request passing through the platform, catching suspicious patterns before they escalate into incidents.

Velocity Checks

Automated rate-limiting rules detect unusual bursts of tokenization or de-tokenization requests from a single merchant, IP address, or API key. Thresholds are configurable per account and trigger automatic temporary blocks with real-time alerts to your security team.

Pattern Detection

Machine-learning models analyse historical request patterns to identify anomalies such as sequential BIN testing, geographic inconsistencies, or unusual de-tokenization volumes. Flagged requests are held for review or automatically rejected depending on your risk policy configuration.

Anomaly Monitoring

Our Security Operations Centre continuously monitors all system metrics, API latency, error rates, authentication failures, and data access patterns. Deviations from baseline behaviour trigger escalation workflows that include automated containment and human review within minutes.

Testing & Audits

Penetration Testing & Security Audits

Independent third-party firms rigorously test our platform. Controls verified to exceed industry benchmarks every cycle.

01

CREST Penetration Tests

Bi-annual tests by CREST-accredited firms covering network, API, OWASP Top 10, and segmentation. All findings remediated within SLA and verified via re-testing.

02

Vulnerability Management

Weekly internal scans across all components. Critical (CVSS 9.0+) patched in 24h, high-severity in 72h. Aligned with NIST SP 800-40 and CI/CD integrated.

03

SOC 2 Type II Reporting

Annual reports covering Security, Availability, and Confidentiality. Audited by independent CPA firms. Available to customers under NDA upon request.

04

Secure Development (SDLC)

Mandatory peer review, SAST, and DAST for every code change. OWASP SAMM guidelines with threat modelling for every change touching the cardholder data environment.

Incident Response

Incident Response & Monitoring

Any security event is detected, contained, and resolved at speed - with full transparency to affected customers.

24/7
Continuous

Monitoring

SIEM-based real-time correlation across all infrastructure layers

<15m
Detection

Initial Triage

Severity classification and containment initiated within 15 minutes

<72h
Response

Notification

Customers notified within 72h per GDPR Art. 33 and PCI DSS

Post
Recovery

Root Cause Analysis

Blameless post-mortem with corrective action plans for stakeholders

SLA Guarantee: 99.95% uptime with automated failover. Any incident affecting production is escalated to senior engineering within 5 minutes of detection.

99.95% Uptime SLA
Certifications

Certifications & Standards

PCI Proxy EU maintains a comprehensive portfolio of security certifications and adheres to internationally recognised frameworks.

PCI DSS Level 1

Highest compliance tier

FIPS 140-2 L3

HSM hardware certification

SOC 2 Type II

Audited internal controls

GDPR

EU data protection

Annual QSA Audit

Full Report on Compliance (RoC)

Quarterly ASV Scans

External vulnerability scanning

Bi-Annual Pen Tests

CREST-accredited third parties

Protect Your Card Data with Enterprise-Grade Security

See how PCI Proxy EU's security architecture reduces your compliance burden and protects cardholder data at every layer.