Security Information
Security is the top priority at Midtrans. Midtrans monitors both internal and external factors to ensure that your payments are secure._
Midtrans Security
- PCI DSS
PCI-DSS (Payment Card Industry Data Security Standard) is a certificate or license issued by the PCI Security Standards Council to maintain the security of all transaction activities through Midtrans payment systems. Midtrans has implemented all security standards, set by the PCI Standard Council, on network and payment systems to minimize any security risk that could interfere with transaction processes in our system.
Midtrans has been audited by the QSA (Qualified Security Assessor) certified by PCI Council. Midtrans is PCI compliant with PCI Service Provider Level 1 certification, which is the most stringent level of certification currently available in the payments industry.
- ISO 27001
ISO27001 (or commonly known as ISO / IEC 27001) is a certificate or license issued by the Internal Standards Organization (ISO) which regulates security management information system.
We have implemented the ISO27001 standard on our system and network to maintain the security of our information.
- AES 256
AES (Advanced Encryption Standard) is an encryption standard that was issued by the National Institute of Standards and Technology (NIST). It is generally used to maintain the confidentiality of data.
At Midtrans, we use AES-256 as a standard of encryption of all transaction data that goes in and out of our system.
-
Fraud Detection System
At Midtrans, we analyze, process, and manage each transaction in detail with our machine learning tool. After these steps, the behavior patterns are analyzed using details such as payment location, email detail, time, and so on.Source: https://midtrans.com/security
HTTPS for Secure Connections
We enforce TLS/SSL encryption to all of our public endpoints via HTTPS, including our public website and Merchant Administration Portal. To ensure that communication coming from merchants & their customers are securely encrypted over the network.
midtrans.min.js
and snap.js
are also securely hosted over HTTPS. We suggest merchants not to host these files on their servers, and should use Midtrans provided url.
Please make sure your system are able to communicate with Midtrans securely by referring to this article about SSL/TLS.
We recommend merchants to also secure their websites & endpoints with HTTPS. This especially important if you want to make sure that notifications coming from Midtrans system to your system is secure. Note: we don't currently have strict requirements, so any valid SSL/TLS/HTTPS used on your side should work.
Card Data Secure Transmission
By following above points, all the data transmission coming from customer device to Midtrans is encrypted over the network layer via SSL/HTTPS. That means data transmission is end-to-end encrypted (customer-to-Midtrans), and secure from any third-party. Only Customer and Midtrans side can see the real value of data being transmitted, unless a third-party has direct control over the user’s device (which means already compromised anyway) or is able to decrypt SSL/HTTPS.
In order to ensure the customer-to-Midtrans encryption are properly implemented, merchants are required to use official Midtrans provided JavaScript library (midtrans.min.js, snap.js, or Mobile SDK) for card transactions. Merchants are strictly prohibited to record card credentials to their own system, unless PCI DSS certified.
Note: Some auditors may run into false-positive reports about being able to see credentials transmitted in plain text. This is possible when the audit is done on the customer device itself, in which case, the data is expected to be visible (not yet encrypted) from the customer device. The better approach is auditors should try to check from non-customer devices such as the network layer or lower layer (as third-party between Midtrans and customer). In that case they will expect to see that the data is securely encrypted from any unauthorized party.
Please also note that HTTPs GET method automatically encrypts any GET query / request credentials (via TLS/HTTPS). Although it sometimes can reveal the destination web domain (which is a safe public information), it will not expose any confidential parameter.
Sensitive Data Encryption
Security is a priority at Midtrans and all transactions processed by our system are always securely encrypted. Midtrans never store any sensitive information in the system and all transactions are transmitted and processed via secured networks.
All encryption and security procedures follow the PCI-DSS standards to ensure highest security protection.
Vulnerability Disclosure
Midtrans is always open to inputs or suggestions related our security processes. If you believe you have found a bug or security issue in Midtrans, please contact [email protected]
or Contact Us Page and we will respond as soon as possible. We encourage your cooperation to disclose it responsibly with us.
Keep Your Server Key Secured
The Server Key you obtained from your Midtrans account is strictly informed only to you as a Merchant. The Server Key should be kept secret. To learn more about how to secure your Server Key, please refer to this article.
Keep Sensitive Parameters Secured
Payment parameters (JSON payload) like gross_amount
, order_id
, credit_card.secure
, and so on are also sensitives, those shouldn't be directly editable from customer side. Otherwise, you are risking your customer being able to modify the payment amount (you may receive wrong/less amount of payment), order id, and/or 3D Secure configuration (you will be more prone to fraud).
This is your implementation responsibility, it can be securely managed from your backend, e.g: via validation and implementation logic.
Securely Verify Payment Status
Learn more on how to securely verify payment status, to avoid system security/financial liability on merchant side.
Others
With the various Security protections provided above,
Implementing SSL certificate pinning on your end is not recommended. If you want to implement SSL certificate pinning, please make sure to understand the considerations explained in this article.
In most cases Mutual (2-way) TLS Authentication (mTLS) should not be needed, and is not recommended due to maintenance complexity. In case you really need to proceed with implementing it, please consult with your Midtrans Business PIC first.
Updated about 1 year ago