Enterprise-grade security you can trust

Shield icon

Our ISO 27001 certification, TÜV Saarland accreditation, and comprehensive security controls safeguard your customers' payment data at every touchpoint—giving you and your users complete confidence in every transaction.

Trusted by the most security-conscious teams

Key security features

Data encryption in transit with no banking credentials ever stored

Use of credentials exactly as provided by the bank; no additional credentials needed

Granular access rights and privileges for merchants and Trustly employees

GDPR-compliant retention periods for transaction data

Shield icon

SSL/TLS-only communication

EU-based hosting on our own servers and cloud services

Disaster recovery and business continuity capabilities to ensure service uptime

External security verifications

Trustly implements best practices to maintain compliance with the following standards and regulations—and assure its users that any information provided to Trustly is fully protected.

To request access to the accompanying documents and/or certifications listed below, please fill out our form.

ISO Icon
Check mark

ISO 27001

Trustly is ISO 27001-certified and servers are hosted at ISO 27001-certified facilities.

TUV Approved pament system
Check mark

Data protection

Trustly is accredited according to TÜV Saarland's "Approved Data Protection" standards.

TUV Approved pament system
Check mark

Payments standards

Trustly is accredited according to TÜV Saarland’s “Approved Payment System” standards.

Check mark

Penetration tests

Penetration testing performed by third-party companies.

Qualys
Check mark

SSL/TLS "A" rating

Trustly’s transit encryption is TLS-only and scores an "A" rating on Qualys SSL Labs Test.

GDPR Compliant Icon
Check mark

GDPR-compliant

Trustly is GDPR-compliant and treats privacy as critical to secure payments.

Quick links

Technical measuresOrganisational security controls

Technical measures

Attack monitoring and prevention

  • The organisation implements attack-monitoring tools—such as network-based intrusion detection and prevention, and web-application firewalls.
  • The organisation also implements Layer 7 web application firewalls.

Anti-malware

  • Anti-malware is installed on all endpoints (desktops, laptops, smartphones and tablets).
  • App-code signing, sandboxing and file quarantine are used for all smartphones and tablets.
  • EDR/XDR technology is used as anti-malware agents on all desktop and laptop computers.
  • EDR/XDR is managed and monitored by a 24/7 Security Operations Center (SOC).
  • Anti-malware is centrally managed and monitored by authorised personnel only.

Data access

  • The organisation implements controls that limit access to the organisation’s data to trusted servers and applications over encrypted channels with strong authentication.
  • The organisation implements controls that limit access to the organisation’s critical third-party applications and data to trusted devices or endpoints using only encryption and strong authentication.
  • The organisation implements multi-factor authentication (MFA) for its staff to access data in critical applications.
  • Data access is locked down so that consultants needing access to our applications also need a trusted endpoint.

Encryption

  • Incoming HTTPS connections are protected with at least TLS 1.2 encryption.
  • Equivalent security is used for other types of encrypted connections such as Ipsec, SSH or SFTP.
  • Asymmetric file or message encryption uses RSA with at least 2048-bit keys or ECC with standard curves such as P256.
  • Symmetric file or message encryption uses AES with at least 256-bit length.
  • Endpoints (desktops, laptops, smartphones and tablets) are protected with full hard-drive encryption.
  • Off-site database backups are protected using strong encryption.
  • Emails are encrypted in transit, over the internet, server-to-server, inbound and outbound, using opportunistic TLS encryption.
  • Specific email domains are protected with forced TLS transit encryption.
  • The Merchant API requires the use of cryptographic signatures, both for incoming requests and outgoing replies, in addition to TLS transit encryption. This guarantees proof-of-possession and minimises the risk of a MITM attack.
  • The checkout service uses per-session point-to-point asymmetric encryption for sensitive end-user data, such as passwords or challenge codes.

Firewalls and access-control lists

  • Local host Layer 3 firewall devices are used internally to support the implementation of access-control lists (ACLs).
  • Layer 3 firewall devices are used to control the network traffic between the public internet and the organisation.
  • Layer 7 firewall devices are used to inspect and control the traffic between the public internet and the organisation’s service.
  • Network ACLs are used to control communication between the organisation’s network, sites and clouds.
  • System ACLs are used to control system access or object access (e.g storage objects).
  • ACLs are managed by authorised employees and are based on job description (for system ACLs) or pre-approved network designs (network ACLs).
  • ACLs are reviewed at regular intervals (based on classification) or when major changes occur.

Logical access control

  • Logical access control is implemented for all systems and services within the organisation.
  • Access permissions are allocated via an approval process and are related to the job description.
  • Access permissions are allocated on a least-privilege basis.
  • Access permissions are reviewed periodically based on the classification of the system/service.

Logging

  • Centralised logging is implemented for applications participating in the offering of the organisation’s payment service.
  • Logs are accessible by authorised employees, based on the need-to-know principle.
  • The log management system is managed by authorised employees.
  • The log management system generates alerts based on predefined criteria.

Mobile Device Management (MDM) Tools

  • The organisation implements an MDM solution for endpoint devices (desktops, laptops, smartphones and tablets), covering both employees and long-term consultants within the organisation.
  • The MDM solution controls who has access to each endpoint using conditional access and two-factor authentication.
  • The MDM solution controls endpoint settings like allowed applications, as well as security settings like encryption and login details.
  • The MDM solution controls endpoint updates like the operating system and application updates that can be pushed to specific devices as needed.
  • The MDM solution can be used to lock or remote-wipe endpoints that have been misplaced.
  • The MDM solution is managed by authorised employees.

Multi-factor authentication

  • The organisation implements multi-factor authentication (MFA) both for services provided and consumed by the organisation.
  • The organisation implements a number of approaches to MFA based on system/service/data classification:
    1. Hardware token MFA
    2. Device certificates
    3. User certificates
    4. Software token MFA (such as TOTP)
    5. SMS (text) MFA

Regular software updates

Security updates are automatically installed.

Source code signing

Source code changes are cryptographically signed by the developer using GPG with private key on a personal HSMs.

Vulnerability detection tools

  • The organisation implements a vulnerability-management program for internal and publicly exposed assets and services.
  • The organisation implements a source code vulnerability scanner.
  • The organisation executes a vulnerability assessment of internal and publicly exposed assets and services on a weekly basis where vulnerabilities are prioritised according to their severity.

Organisational security controls

Acceptable Use Policies (AUP)

The organisation publishes Acceptable Use Policies (AUP) for its internal systems/services and notifies affected employees/contractors when changes occur.

Awareness and training

The organisation provides mandatory training for all employees and contractors on the following areas:

  • Information security
  • Privacy
  • Risk management
  • Compliance
  • Anti-money laundering

Business continuity plans

The organisation implements a number of continuity activities:

  • Crisis management planning
  • Business continuity planning
  • Disaster recovery planning

Change management

The organisation implements change management in line with the ITIL process.

Data processing agreements (DPAs)

The organisation implements agreements concerning processing of data when personal data is exchanged between the organisation and third parties.

Incident response plans

  • The organisation implements an incident management program designed to maximise service availability and minimise disruptions for the organisation and its partners.
  • The incident management program is managed by the Service Management department.

Penetration tests

  • The organisation performs penetration testing annually or upon major changes.
  • The penetration testing is performed by well-known, established security companies.
  • The organisation shares the penetration re-test report with third parties upon request.

Password policies

  • The organisation implements a baseline password policy for all systems/services.
  • Each system/service owner can choose to go above and beyond the defined baseline.
  • The baseline password policy is defined as:
    1. Minimum length: 10 characters
    2. Complexity: enforced
    3. 2FA/MFA: enforced (where possible)

Secure premises

  • The organisation provides its services through the use of well-known cloud service providers (e.g. AWS, GCP) and co-location data centers.
  • Access to the co-location data centers is strictly limited to a small number of authorised employees.

Secure Development Lifecycle (SDL)

The organisation implements a Secure Development Lifecycle (SDL) model for the services/products developed internally.

Secure disposal

The organisation implements secure disposal both for endpoint devices and devices offering the production service.

Source code reviews and deployment

The organisation implements the four-eye principle for segregation of duties for most source code changes.

Vendor assessments

The organisation implements a continuous process to evaluate and assess vendors introduced both for production and productivity reasons.

Have you found a security issue?

We appreciate your effort to maintain the highest security. If you've discovered a security issue, please report it through our responsible disclosure policy.

Report an issue