Skip to main content

PCI Compliance

Azotte is PCI DSS Level 1 compliant, ensuring the highest standards of payment card data security.

PCI DSS Overview

What is PCI DSS?

The Payment Card Industry Data Security Standard (PCI DSS) is a set of security standards designed to ensure that all companies that accept, process, store, or transmit credit card information maintain a secure environment.

Compliance Levels

  • Level 1: Merchants processing 6M+ transactions annually
  • Level 2: Merchants processing 1-6M transactions annually
  • Level 3: Merchants processing 20K-1M e-commerce transactions annually
  • Level 4: All other merchants processing up to 20K transactions annually

Azotte's PCI Compliance

Level 1 Certification

  • Annual on-site security assessments
  • Quarterly network security scans
  • Comprehensive security controls
  • Regular compliance validation

Certification Details

  • Level: PCI DSS Level 1 Service Provider
  • Assessor: Qualified Security Assessor (QSA)
  • Scope: Full payment processing infrastructure
  • Validation: Annual Report on Compliance (ROC)

Security Architecture

Network Security

Internet


┌────────────────────┐
│ WAF/DDoS │
│ Protection │
└──────────┬─────────┘


┌────────────────────┐
│ Load Balancer │
│ (SSL Termination)│
└──────────┬─────────┘


┌────────────────────┐
│ Application Tier │
│ (No Card Data) │
└──────────┬─────────┘


┌────────────────────┐
│ Secure Vault │
│ (Encrypted CHD) │
└────────────────────┘

Data Protection

  • Encryption at Rest: AES-256 encryption for stored data
  • Encryption in Transit: TLS 1.3 for all communications
  • Tokenization: Replace sensitive data with tokens
  • Key Management: Hardware Security Modules (HSMs)

Tokenization

How Tokenization Works

  1. Data Collection: Sensitive card data collected securely
  2. Token Generation: Unique token created for card data
  3. Secure Storage: Original data stored in encrypted vault
  4. Token Distribution: Token used throughout system
  5. Detokenization: Original data retrieved only when needed

Token Format

Original PAN:  4242 4242 4242 4242
Token: tok_1BRoAoH7XjZ8QQMVz9mQ0p3x

# Tokens are:
# - Irreversible without access to vault
# - Format-preserving or completely different format
# - Unique per merchant/customer combination

Your Compliance Obligations

Using Azotte Reduces Your Scope

By using Azotte's tokenized approach, your PCI compliance scope is significantly reduced:

Traditional Processing (Full Scope)

  • Card data flows through your systems
  • Full PCI DSS compliance required
  • Extensive security controls needed
  • Annual assessments required

Azotte Tokenized Approach (Reduced Scope)

  • No card data touches your systems
  • Simplified compliance requirements
  • Self-Assessment Questionnaire (SAQ A)
  • Reduced security controls needed

SAQ A Requirements

With Azotte's tokenized solution, most merchants qualify for SAQ A:

  • No cardholder data storage
  • HTTPS for all web pages
  • Regular security updates
  • Strong access controls

Security Best Practices

Integration Security

// ✅ Good: Use HTTPS for all API calls
const response = await fetch('https://api.azotte.com/v1/payments', {
method: 'POST',
headers: {
'Authorization': `Bearer ${apiKey}`,
'Content-Type': 'application/json'
},
body: JSON.stringify(paymentData)
});

// ❌ Bad: Never use HTTP
// const response = await fetch('http://api.azotte.com/v1/payments', ...);

API Key Security

# ✅ Good: Use environment variables
export AZOTTE_API_KEY="sk_live_..."

# ❌ Bad: Never hardcode in source code
# const apiKey = "sk_live_1234567890abcdef";

Webhook Security

// Always verify webhook signatures
const crypto = require('crypto');

function verifyWebhook(payload, signature, secret) {
const expectedSignature = crypto
.createHmac('sha256', secret)
.update(payload)
.digest('hex');

return signature === `sha256=${expectedSignature}`;
}

Compliance Documentation

Available Documents

  • AOC (Attestation of Compliance): Proof of PCI compliance
  • ROC (Report on Compliance): Detailed compliance report
  • Security Policies: Internal security procedures
  • Penetration Test Reports: Third-party security assessments

Accessing Documents

  1. Log into Azotte Portal
  2. Navigate to Security & Compliance
  3. Download required documents
  4. Share with your compliance team

Incident Response

Security Monitoring

  • 24/7 security operations center
  • Real-time threat detection
  • Automated incident response
  • Regular security patching

Breach Notification

  • Immediate containment procedures
  • Forensic investigation
  • Regulatory notifications
  • Customer communication

Regular Assessments

Internal Assessments

  • Quarterly vulnerability scans
  • Annual penetration testing
  • Continuous security monitoring
  • Regular policy reviews

External Validation

  • Annual QSA assessment
  • Independent security audits
  • Compliance certification renewal
  • Third-party security reviews

Next Steps