Home Legal Security

Security at QairoPay.

We treat customer funds and customer data with the same posture: encrypted, audited, and isolated. This page is a plain summary of what we do and what we ask of you.

Last updated: 2026-05-19 [email protected]

Certifications and audits

QairoPay maintains independent third-party assurance against the following frameworks. Reports and bridge letters are available to customers and qualified prospects under NDA.

Internal audits run continuously through automated control monitoring; remediation SLAs are tracked against control owners and reported to the Security Steering Committee monthly.

Encryption

All data is encrypted in transit and at rest. Encryption is layered, with separate key hierarchies for tenant-scoped data and for cardholder data.

In transit

At rest

Key management

KEK rotation is automatic on a 90-day cadence; emergency rotation runs in under fifteen minutes against the full tenant set. KMS audit logs are streamed to the same immutable log sink used by the application audit log.

Access control

Customer authentication

Tenant isolation

Every record is tagged with a tenant_id. Application middleware enforces a tenant-scoped query context on every request; cross-tenant queries are technically impossible from the API surface and are alerted on at the database layer.

Internal access

Infrastructure

QairoPay runs on Google Cloud Platform in us-central and us-east regions with active-active failover. Production workloads execute on GKE Autopilot; primary datastores are Cloud SQL (PostgreSQL) and Memorystore (Redis).

Data handling and retention

QairoPay processes the minimum data required to deliver the service. Categories and retention windows are documented in the Privacy Policy; this section covers the technical handling.

Monitoring and audit log

Every authenticated action — API call, admin operation, pass issuance, settlement leg, role change — is recorded to an append-only audit log with a tenant-scoped Merkle chain. Audit records are immutable from the application's perspective and are streamed to a separate logging project that the application has no write access to.

Incident response

QairoPay maintains a written Incident Response Plan reviewed annually and rehearsed quarterly via tabletop exercises.

Vulnerability disclosure

We welcome reports from independent security researchers. A formal Vulnerability Disclosure Program (VDP) and a private bug-bounty program are operated; safe-harbor terms cover good-faith testing within the program's scope.

Shared responsibility

Security is a shared responsibility. QairoPay secures the platform; customers secure their use of it. The most common customer-side responsibilities:

Reporting a security issue

To report a suspected vulnerability or active incident, contact [email protected]. PGP keys are published at /.well-known/security.txt. Please include a clear reproduction path and any artifacts that demonstrate impact.

For customer-facing security questionnaires (CAIQ, SIG, vendor reviews), email [email protected] or request access to our Trust Center.


This page is informational and does not modify the contractual obligations defined in your QairoPay Master Services Agreement, Data Processing Addendum, or Security Schedule. Where this page conflicts with executed contract language, the contract governs.