Skip to content

Security & Compliance

A KYC system handles some of the most sensitive data a person can share: their Aadhaar number, PAN (Permanent Account Number), bank account details, biometric photographs, and signed financial declarations. This page outlines the security standards and regulatory compliance requirements that govern how this data must be stored, transmitted, and accessed. If you are building or reviewing any part of the KYC stack, these are the non-negotiable guardrails.

These are the baseline standards that every component of the KYC system must meet, regardless of which vendor or deployment environment is involved.

RequirementStandard
TransportTLS (Transport Layer Security) 1.2+ (HTTPS only)
AuthenticationAPI keys rotated quarterly
IP WhitelistingRequired for KRA, recommended for all
Data EncryptionAES-256 for data at rest
PII HandlingMask Aadhaar (XXXX-XXXX-1234), tokenize PAN
Data Retention8 years (SEBI 2026 Regulations)
VIPV Recording7 years minimum (tamper-proof)
DPDP Act 2023Consent management, data principal rights
Vendor SLA99.9% uptime, <3s P95, India data center, SOC 2 / ISO 27001

In plain English: everything is encrypted in transit and at rest, sensitive identifiers are masked or tokenized, and all records must be kept for at least eight years.

Per UIDAI (Unique Identification Authority of India) Aadhaar Data Vault specifications, there is a strict separation between how Aadhaar numbers are stored and how the rest of the application accesses them.

  • Aadhaar numbers must NOT be stored in application databases
  • Use a dedicated Aadhaar Data Vault with reference token mapping
  • All Aadhaar access must be logged with purpose
  • Data vault must support search by reference token only

You will encounter the reference token in many parts of the codebase. Whenever you see a field like aadhaar_reference_number instead of a raw 12-digit number, that is the data vault pattern at work.

Every external API integration — whether it is PAN verification, penny drop, or KRA submission — must follow these controls.

ControlImplementation
Rate limitingPer-API, per-client throttling
Request signingHMAC-SHA256 on webhook payloads
Idempotencyreference_id on all mutable API calls
Timeout handlingCircuit breaker with exponential backoff
Credential storageSecrets manager (never in code/config)
Audit loggingAll API calls logged with timestamp, user, action, result

The KYC system sits at the intersection of multiple regulatory regimes. You will see references to these regulations throughout the codebase and in vendor documentation.

RegulationKey Requirements
SEBI (Securities and Exchange Board of India) Stock Brokers Regulations 20268-year retention, enhanced governance, capital adequacy
SEBI Cybersecurity FrameworkCISO appointment, vulnerability assessment, incident response
DPDP (Digital Personal Data Protection) Act 2023Consent before processing, right to erasure (with exemptions for regulatory records), data localization
PCI DSS (Payment Card Industry Data Security Standard)Applicable if handling payment card data (UPI/mandate setup)
PMLA (Prevention of Money Laundering Act) 2002CDD (Customer Due Diligence), EDD (Enhanced Due Diligence) for high-risk clients, STR (Suspicious Transaction Report) filing
IT Act 2000Section 65B audit trail for e-signed documents