Enterprise-Grade Security

Built for Central Bank licensing with bank-grade encryption, compliance infrastructure, and 24/7 monitoring. Your money and data are protected by multiple layers of security.

Central Bank Licensed 6 Countries PCI DSS Compliant AI-Powered

Multi-Layer Security Architecture

Every transaction is protected by enterprise-grade security measures

End-to-End Encryption

All data is encrypted in transit and at rest using AES-256 encryption. Your information is never stored in plain text.

Biometric Authentication

Face ID, fingerprint, and PIN protection. Multi-factor authentication for all sensitive operations.

24/7 Monitoring

Real-time fraud detection powered by AI. Suspicious activity is flagged and blocked automatically.

Secure Key Management

Hardware security modules (HSM) protect cryptographic keys. No single person has access to funds.

Device Binding

Your account is tied to your device. New device logins require verification via SMS, email, or biometrics.

Audit Trails

Every action is logged with timestamps, IP addresses, and device info for complete accountability.

Compliance-First Architecture

Built to meet the highest regulatory standards for payment service providers

KYC/AML Compliance

Full Know Your Customer (KYC) and Anti-Money Laundering (AML) checks for all users. ID verification, selfie capture, address proof, and ongoing transaction monitoring.

KYB for Merchants

Know Your Business (KYB) verification for all merchants. Business registration documents, beneficial ownership disclosure, and risk assessment.

Wallet Ledger System

Double-entry accounting for all transactions. Real-time balance reconciliation and immutable transaction records for audit purposes.

Regulator Access

Dedicated dashboard for central banks and regulators. Real-time transaction monitoring, suspicious activity reports, and policy enforcement tools.

Industry Certifications

Certified and audited by leading security and compliance organizations

PCI DSS Level 1

Payment Card Industry Data Security Standard compliance for card processing

ISO 27001

Information security management system certification

GDPR Compliant

Full compliance with EU data protection regulations

Central Bank Licensed

Licensed Payment Service Provider in 6 African countries

Encryption — Every Layer, Every State

WhatStandardImplementation
Data at restAES-256AWS RDS encryption, enabled at creation
S3 documentsAES-256-GCMCustomer-managed KMS CMK, per-document key
PII fieldsAES-256-GCMColumn-level encryption on ID numbers, names
PasswordsArgon2id64MB memory, 3 iterations, 4 parallelism threads
MFA secretsAES-256-GCMApplication-layer encryption before storage
Card dataTokenizedRaw PAN never stored — PCI DSS SAQ A scope
Data in transitTLS 1.3TLS 1.0/1.1 disabled at load balancer
JWT signingRS256RSA-2048 asymmetric, public key at /.well-known/jwks
Key rotationAutomaticAWS KMS — every 90 days, zero-downtime drain

Zero Trust. Least Privilege. Always.

AuraTap implements a three-tier access control model. No service has more access than it needs. No human has permanent elevated access. Every action is logged, timestamped, and immutable.

INFRASTRUCTURE LEVEL

  • VPC with private subnets for all services
  • No service directly internet-accessible
  • All traffic routed through API Gateway
  • Database accessible only from application subnet
  • S3 access via VPC endpoint — no public internet path
  • WAF rules: OWASP Top 10, rate limiting, geo-blocking

APPLICATION LEVEL

  • JWT claims validated on every request (no session trust)
  • RBAC with 40+ granular permission codes
  • Permission checks at middleware — not UI
  • Country-scoped access: admins limited to assigned markets
  • Audit log written on every privileged action
  • Admin sessions maximum 8-hour TTL

DATABASE LEVEL

  • Separate PostgreSQL role per service (schema isolation)
  • Ledger table: UPDATE and DELETE REVOKED from app role
  • Audit log table: UPDATE and DELETE REVOKED from app role
  • Read replica for reporting — no write access
  • Regulator access via read-only replica only

Compliance Certifications — Technical Detail

PCI DSS Level 1

AuraTap operates at PCI DSS SAQ A scope — the most restrictive compliance posture. Raw card numbers (PAN), CVV, and track data never enter AuraTap infrastructure. All card data tokenized at point of entry by our PCI-certified payment gateway partner. SoftPOS NFC uses EMV cryptograms — card data encrypted in hardware before transmission. Card processing occurs on an isolated network segment with separate VPC subnet and security group rules.

ISO 27001

Information Security Management System certification covering: risk assessment framework, security policies, asset management, access control, cryptography, physical security, incident management, and business continuity. Annual external audit required.

GDPR

Full EU data protection compliance. Data minimization principle applied to all collection. Lawful basis documented for all processing activities. Right to erasure: soft delete with 90-day purge on PII. Right to portability: full data export available in JSON format. Data Processing Agreements in place with all sub-processors. DPA available on request to info@auratap.com.

Central Bank Licensed

PSP licence applications filed and active in:

Ghana (Bank of Ghana)
Nigeria (Central Bank of Nigeria)
South Africa (FSCA/SARB)
Uganda (Bank of Uganda)

Regulatory capital requirements maintained. Quarterly reporting submitted to each regulator. Safeguarding accounts verified monthly.

Your Data, Your Control

We believe in data privacy and transparency. You have full control over your personal information and can request data export or deletion at any time.

  • Data encrypted at rest and in transit
  • No data sold to third parties
  • Right to data portability and deletion
  • Regular security audits and penetration testing

Security Features

Encryption
AES-256
2FA
Enabled
Biometrics
Active
Monitoring
24/7

If Something Goes Wrong

We don't hide incidents. We contain them.

Detection
< 5 minutes
AWS CloudWatch Synthetics + Sentry alerts
Escalation
< 15 minutes
PagerDuty on-call engineer paged
Containment
< 30 minutes
Affected service isolated, rollback initiated
User notification
100%
All affected users notified within 1 hour
Post-mortem
Published internally
Within 48 hours
Regulatory report
Filed
Within timeframe required by each jurisdiction

Our incident response runbooks are maintained in version control. Every engineer practices them quarterly. No improvisation in a crisis.

Rapid Incident Response

Our security team monitors the platform 24/7. In the unlikely event of a security incident, we have protocols in place to respond within minutes, contain the threat, and notify affected users immediately.

< 5 min

Incident detection time

< 15 min

Response activation

100%

User notification rate

Questions About Security?

Our security team is available to answer your questions and provide detailed documentation