Deep dive into the cloud-native, event-driven architecture designed for high availability, resilience, low-latency, and PCI-DSS compliance supporting both card-based and UPI transactions.
Edge delivery
TLS termination at edge, with integrated WAF for global performance.
Web protection
Protects against OWASP Top 10 threats, IP blocks, geo rules.
DNS & routing
Single hosted zone with health checks and global routing.
Certificates
TLS 1.2+ enforced, mTLS for PoS devices using X.509 certs.
This diagram shows the complete end-to-end payment processing architecture with all AWS services, data flows, and security controls across multiple regions.
Route 53 DNS resolution → CloudFront CDN → WAF security filtering → SSL/TLS termination
Request validation → JWT/mTLS authentication → Rate limiting → Request transformation
EKS microservices → Tokenization → Risk analysis → Payment routing
Aurora transactions → DynamoDB lookups → Kafka events → Redis caching
KMS encryption at rest → CloudHSM for PCI DSS → Secrets Manager for credentials
VPC isolation → Private subnets → Security groups → NACLs → NAT gateways
CloudTrail logging → GuardDuty threat detection → Config compliance → IAM policies
Token vault isolation → Audit logging → Network segmentation → Regular assessments
Stateless service determining channel (UPI/Card)
Emits: payment.route.upi
or payment.route.card
Receives payment.route.card
Routing table stored in DynamoDB/Redis
Encodes/sends ISO 8583 over HTTPS/TCP
Handles acquirer fallback + retries
Manages UPI flow: QR/VPA intent creation
PSP API integration
Publishes: upi.status.updated
The Gateway Orchestrator is the central brain of the payment gateway — responsible for managing the core payment workflows. In an event-driven, choreography-based architecture, it doesn't command subservices but emits and reacts to events, allowing loosely coupled services to collaborate.
payment.initiated
(from Edge API layer) → consumed by Orchestratortoken.requested
token.created
risk.check.initiated
risk.cleared
route.to.acquirer
→ Router handles itpayment.authorized
is publishedKey Principle:
Orchestrator only reacts to and emits events, it does not call services directly (pure choreography).
Multi-AZ, read replicas, point-in-time recovery
Configurations, tokens, session state
Session cache, rate limiting, routing tables
Event choreography, async processing
Real-time analytics, fraud detection
Log aggregation, search, dashboards
Encryption at rest for all data stores
Hardware security module for PCI DSS
Credentials rotation, secure access
Private subnets, NAT gateways, security groups
DDoS protection, OWASP rules, rate limiting
Threat detection, anomaly monitoring
API logging, audit trails, compliance
Configuration compliance, remediation
Fine-grained access control, roles
Custom metrics, dashboards, alarms for SLOs
Distributed tracing, latency analysis
Parameter store, patch management
Multi-channel notifications (email, SMS, Slack)
Dead letter queues, retry mechanisms
Threshold-based alerts, composite alarms
Cross-Region Data Flow