Security is not a feature. It is the foundation.
Every layer of Techvica's infrastructure is designed around the assumption that financial data demands the highest standard of protection. Not just at audit time - continuously.
What we secure on the platform-and what your organisation attests to.
SOC 2 Type II readiness
Techvica does not issue a SOC 2 Type II report. Instead, our team helps yours map controls, collect evidence, and respond to auditor questions so you can pursue attestation with your CPA firm.
- Shared responsibility matrices for infrastructure vs. your applications
- Pre-filled control narratives you can adapt for your environment
- Office hours with our security team during audit windows
- No substitute for your own signed SOC 2 report
PCI DSS program support
Card data often lives in your compliance boundary even when you process through a platform. We help you document how Techvica fits your PCI scope and coordinate with your Qualified Security Assessor. Your Attestation of Compliance remains yours.
- Architecture diagrams for cardholder data flows involving our APIs
- Written answers for common acquirer and QSA questionnaires
- Guidance on tokenisation and segmentation patterns
- We do not hold a PCI DSS Level 1 AOC on your behalf
End-to-end Encryption
FIPS 140-2 validated cryptographic modules protect data at rest and in transit. Keys are managed with hardware-backed HSMs where contracted. Access to production data follows least-privilege and break-glass procedures.
- FIPS 140-2 validated encryption for data at rest
- FIPS-approved algorithms for all data in transit
- Hardware Security Module (HSM) key storage available
- Key rotation and access reviews on a defined schedule
- NIST SP 800-series aligned key management practices
- Detailed encryption appendix available under NDA
Data Residency
Choose where your data lives. We support EU (Frankfurt, Ireland), UK (London), US (Virginia, Oregon), and Australia / New Zealand-aligned regional deployment options. Data does not leave your selected region unless you explicitly authorise it.
- EU, UK, US, Australia, and New Zealand region options
- Contractually enforced data boundary
- Backups remain in-region by default
- Cross-region replication only with written consent
- Transfer mechanisms for GDPR Article 44+ where applicable
Defense in depth.
Built for supervised workloads
We work with banks, lenders, and fintechs that answer to serious regulators. Our documentation is written so your compliance and legal teams can place us inside their third-party risk programs-not so we can claim their licences for you.
ISO-aligned security practices
Policies, access reviews, and change control are modelled on ISO 27001-style expectations. You map them into your own ISMS; we do not present a Techvica ISO certificate as a substitute for yours.
Role-based Access Control
Granular, attribute-based permissions. Every user action is scoped to the minimum required access. SSO via SAML 2.0 and OIDC. MFA enforced across all roles with access to production systems.
Immutable Audit Log
Every action on the platform - API call, dashboard click, configuration change - is appended to a tamper-evident log. Queryable via API. Exportable for your own SIEM. Retained for 7 years.
Annual Penetration Testing
External penetration tests conducted annually by CREST-accredited firms. Results and remediation timelines are shared with enterprise customers. Bug bounty programme via HackerOne for continuous coverage.
Privacy by design. Not by policy.
We collect the minimum data required to operate the service. Every data subject right is implementable via API - so your compliance team can fulfil requests in minutes, not days.
Request our DPAGDPR commitments
- 01Data Processing Agreements (DPAs) available for all customers
- 02GDPR Article 28 compliant sub-processor list published and maintained
- 03Right of access, erasure, and portability supported via API
- 0472-hour breach notification SLA
- 05Data Protection Officer (DPO) on staff
- 06Privacy by design - minimum data collection, maximum control
What we secure. What you control.
Techvica is responsible for
- Physical and network infrastructure
- Platform software and API layer
- Encryption key management
- Documentation for your SOC 2 and PCI programs
- Incident response and breach notification
- Vulnerability management and patching
You is responsible for
- User access and permission management
- API key rotation and secret hygiene
- Client-side application security
- Data you collect from your end users
- Your own compliance obligations to your regulators
- Webhook endpoint security
Need to complete a vendor security review?
We respond to security questionnaires within 2 business days. Our security team is available for calls with your CISO or compliance officer.