Get Ready for the Future! Download the State of Checkout 2025 White Paper Today
Platform

Product & Solutions

Learn more about the only open payments platform built for global commerce

How it Works

Solutions

Open Payments Connectivity
Payment Data Security & Compliance
Intelligent Payment Optimization
Fraud Prevention & Authentication
Operational Agility & Simplicity
Centralized Management & Reporting

Platform Pillars

Connect

The unified orchestration layer for wallets and alternative payments

Vault

The secure repository for all your payment methods

Optimize

Workflow-driven payments intelligence for smarter routing and higher auth rates

Protect

A flexible fraud and authentication layer. Instantly add advanced fraud tools and 3DS

Resolve

Reduce siloes, advanced security and billing control

View How Spreedly

Connects to your favorite payment methods
Optimizes your revenue
Protects your data
Reduces fraud
View the Demo
Resources

The Open Payments Library

Take a look at all of our resources and get the information you need to grow your business

View all Resources

Featured resources

The Payments Guide to Expansion into LATAM
Accelerate Your Growth by Expanding into Brazil
Security, Compliance, and AI: Inside Spreedly’s 2025 Foundation:

Spreedly Makes Agentic Commerce a Live Channel for Merchants

Read More
Company

Support Portal

Spreedly Support
Trust Center
Platform Status

Developer Portal

Developer Guides
Documentation
Parter Integrations

Partners & Integrations

Integrations Ecosystem
Our Partners

Latest Partner News

Webinars

Paysafe Unveils Strategic Partnership with Spreedly

Featured Partner

PayPal
Product & Solutions

Product & Solutions

Learn more about the only open payments platform built for global commerce

How it Works

Solutions

Open Payments Connectivity
Payment Data Security & Compliance
Intelligent Payment Optimization
Fraud Prevention & Authentication
Operational Agility & Simplicity
Centralized Management & Reporting

Platform Pillars

Connect

The unified orchestration layer for wallets and alternative payments

Vault

The secure repository for all your payment methods

Optimize

Workflow-driven payments intelligence for smarter routing and higher auth rates

Protect

A flexible fraud and authentication layer. Instantly add advanced fraud tools and 3DS

Resolve

Reduce siloes, advanced security and billing control

View How Spreedly

Connects to your favorite payment methods
Optimizes your revenue
Protects your data
Reduces fraud
View the Demo
Pricing
Resources

The Open Payments Library

Take a look at all of our resources and get the information you need to grow your business

View all Resources

Featured resources

The Payments Guide to Expansion into LATAM
Accelerate Your Growth by Expanding into Brazil
Security, Compliance, and AI: Inside Spreedly’s 2025 Foundation:

Spreedly Makes Agentic Commerce a Live Channel for Merchants

Read More
Developers

Support Portal

Spreedly Support
Trust Center
Platform Status

Developer Portal

Developer Guides
Documentation
Partners & Integrations

Partners & Integrations

Integrations Ecosystem
Our Partners

Latest Partner News

Webinars

Paysafe Unveils Strategic Partnership with Spreedly

Featured Partner

PayPal
Company

Company

About
Leadership
Careers
Contact Us
News
Company
Log In
See a Demo
Log In
See a Demo
Platform

Product & Solutions

Learn more about the only open payments platform built for global commerce

How it Works

Solutions

Open Payments Connectivity
Payment Data Security & Compliance
Intelligent Payment Optimization
Fraud Prevention & Authentication
Operational Agility & Simplicity
Centralized Management & Reporting

Platform Pillars

Connect

The unified orchestration layer for wallets and alternative payments

Vault

The secure repository for all your payment methods

Optimize

Workflow-driven payments intelligence for smarter routing and higher auth rates

Protect

A flexible fraud and authentication layer. Instantly add advanced fraud tools and 3DS

Resolve

Reduce siloes, advanced security and billing control

View How Spreedly

Connects to your favorite payment methods
Optimizes your revenue
Protects your data
Reduces fraud
View the Demo
Use Cases
Resources

The Open Payments Library

Take a look at all of our resources and get the information you need to grow your business

View all Resources

Featured resources

The Payments Guide to Expansion into LATAM
Accelerate Your Growth by Expanding into Brazil
Security, Compliance, and AI: Inside Spreedly’s 2025 Foundation:

Spreedly Makes Agentic Commerce a Live Channel for Merchants

Read More
Company

Support Portal

Spreedly Support
Trust Center
Platform Status

Developer Portal

Developer Guides
Documentation
Blog
Platform

Product & Solutions

Learn more about the only open payments platform built for global commerce

How it Works

Solutions

Open Payments Connectivity
Payment Data Security & Compliance
Intelligent Payment Optimization
Fraud Prevention & Authentication
Operational Agility & Simplicity
Centralized Management & Reporting

Platform Pillars

Connect

The unified orchestration layer for wallets and alternative payments

Vault

The secure repository for all your payment methods

Optimize

Workflow-driven payments intelligence for smarter routing and higher auth rates

Protect

A flexible fraud and authentication layer. Instantly add advanced fraud tools and 3DS

Resolve

Reduce siloes, advanced security and billing control

View How Spreedly

Connects to your favorite payment methods
Optimizes your revenue
Protects your data
Reduces fraud
View the Demo
Use Cases
Resources

The Open Payments Library

Take a look at all of our resources and get the information you need to grow your business

View all Resources

Featured resources

The Payments Guide to Expansion into LATAM
Accelerate Your Growth by Expanding into Brazil
Security, Compliance, and AI: Inside Spreedly’s 2025 Foundation:

Spreedly Makes Agentic Commerce a Live Channel for Merchants

Read More
Company

Support Portal

Spreedly Support
Trust Center
Platform Status

Developer Portal

Developer Guides
Documentation
Blog
Log In
See Demo
Back to Blog
Back to News

Payment Security

March 24, 2022

Cyber Hygiene: Important Considerations in Supporting Payments

Going above and beyond compliance to deliver Payments Orchestration

Written by

Jennifer Rosario

In this article

Share

Related products

No items found.

Lorem Ipsum Dolor Sit

Vel sed vitae enim nec suspendisse ut viverra tincidunt quis

Learn More

Delivering a successful Payments Orchestration solution requires that we go above and beyond simple compliance. We must deliver the utmost confidence and trust in the security of our customer’s payments data. 

Failing to focus enough resources on security has been evidenced by past breaches to be a faulty and dangerous approach to doing business online. Ensuring basic cyber hygiene best practices are in place for your organization will not only deter a malicious attacker but also provide an additional layer of security needed in today’s world to appropriately protect critical data.

This is not to say that compliance is not important, it clearly is. The ability to comply with the various regulatory, statutory requirements is necessary to demonstrate a level of maturity. However, compliance is the bare minimum. If one prioritizes security frameworks (think NIST, ISO, etc.) and best practices (think CSA CCM, SANS/CIS Top Ten) as the core of an information a security program, compliance (think CCPA, GDPR) comes naturally. 

As Spreedly is an international organization providing services to customers all over the world, assessing and aligning to the multitude of security and privacy expectations is a daunting task. Risk management must be a part of an effective security program. One of the tools we've found tremendously valuable that brings both the security and compliance needs into one view is the Secure Controls Framework (SCF). 

The SCF provides a clear view on the controls needed to assess our environment against. It’s worth noting that this is still a significant effort that takes time and focus. In this piece, we’ll talk about basic cyber hygiene as a starting point for building out a comprehensive information security program. We will then explore how commiting to a recurring plan can expand and mature your control environment. 

Several basic cyber hygiene best practices are noted below. Be aware there may be some additional business/industry specific focus areas so be sure to engage stakeholders across the organization to discuss business processes and risks which are most likely. Start addressing those that would have the most impact.

Continuity and exercise 

Develop a business continuity plan to define what processes (and therein third parties, people, locations, etc.) are most important to the business (this will become the basis of needs for the information security program – the crown jewels if you will). Conduct exercises on likely scenarios and include the employees who would potentially be engaged so they are prepared. 

Use a risk-based approach 

Risk management will help prioritize what to focus on first and be sure to include key stakeholders in the risk assessment process to get a true risk picture.

Classify 

Put a data classification program in place that clearly identifies the types of data that employees need to protect and how. 

Educate 

Employees are often the first and last line of defense; spend time on awareness training that is specific to the business so they can easily spot phishing, smishing, other scams, and understand the importance of key controls. 

Maintain 

Keep your infrastructure and applications up-to-date with security patches; scan for vulnerabilities often; conduct penetration testing at least annually.

Use passphrases 

Require long passwords that can easily be remembered; promote the passphrase concept where a sentence or words that mean something to you (and you only) are allowed to be a password; don’t reuse; consider investing in a password manager for use by all employees (including personal use at home). 

Encrypt 

Encrypt your data wherever possible, at least the most important data based on your data classification program. 

Trust but verify 

Enforce multi-factor authentication on as many applications as possible; in today’s remote world, two-factor is a necessity. 

Vendor accountability 

Using your data classification program, assess vendors based on the data they store, process, or transmit on your behalf as they are an extension of your business. 

Insure 

Consider cyber insurance as risk mitigation, breaches can happen to even the most secure business. 

After these foundational items are in place, start to formally add additional key controls to your program via the SCF. Ideally, a business continuity plan is in place along with knowledge of what business processes, third party, people dependencies are unique to the business. This helps to engage the right people when scoping out the additional SCF controls needed. At a minimum, I recommend including Legal, Human Resources, IT, and Compliance to start as a cross-functional team, since these are critical enterprise roles who typically own controls that can have the most impact. 

Once the team is defined, seek to identify all regulatory and statutory requirements, this is where the legal stakeholder will provide expertise. Then as a team, agree upon other security requirements based on the business needs (ideally using the output from the business impact analysis (BIA) from the business continuity plan). 

With hundreds of controls, assessing the SCF can be overwhelming, so start with the “must have” as is recommended via the SCF instructions. Once the musts are defined, you have a starting point. To begin the assessment, determine which of the “must have” requirements address the most significant risk and start there. Consider conducting a phased assessment process in which the team can divide up the first pass review in which the control owner is identified. The second pass review would be assigned to the control owner. This activity can be done asynchronously or in group meetings, it’s really up to company culture and how work gets done. In order for a control to be considered in place, it must be documented. If it isn't documented, it doesn't exist. 

As part of our assessment, several new columns were added to the SCF spreadsheet as noted:

  • Existing Control in Place? - yes | no | follow-up needed
  • Documentation Location - link to where the document is stored
  • Control Owner Title - ex. Director of IT
  • Control Owner Name - employee name(s)
  • Control Owner Reviewed - yes | blank (this was used for the second pass mentioned above)
  • Comments - catch-all field where notes were added for follow-ups, additional context needed, etc.

We also filtered on the “Relative Control Weighting (1-10)” column to get better insight into what areas should be prioritized. We ended up downgrading some controls that weren’t as critical for our environment. The SCF sheet mentions these weightings are subjective and should be changed to suit respective risk appetites. 

Once both assessment passes are complete and the weighting reviewed, you now have your control framework. Using our custom column “Existing Control In Place?”, filter on any no’s and follow-ups to start building out a roadmap of work to be done. If this list is numerous, consider filtering on those with a “10” weighting as a starting point. As those controls are addressed to an adequate level for your business, continue to build out your information security program with “nice to haves”.  

Continue this approach iteratively on at least an annual basis and be sure to look for the latest version of the SCF, which is typically updated several times a year. Following the process will ensure your information security program will be compliant but more importantly, built on sound, comprehensive security controls. 

Learn more about the steps Spreedly takes to ensure your customer’s financial information is secure, while still allowing you to process transactions seamlessly.

‍

Download the PCI Compliance eBook Below

Support Portal

Spreedly Support
Trust Center
Platform Status

Developer Portal

Developer Guides
Documentation
Read more
Written By
No items found.

Navigating AI Risk

Building Resilience for Global Scale

Download Free
Get My Report
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

140+ Payment Integrations

Managed Payment Vault

Learn More
Download Free
Get My Report
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Written by

Jennifer Rosario

Jennifer Rosario is Chief Information Security Officer at Spreedly, where she leads the strategy and execution of security, privacy, compliance, and IT across the organization. With more than 20 years of experience in cybersecurity and a decade leading global teams, she focuses on building risk-aligned security programs that protect the enterprise while enabling the business to scale with speed and confidence.Jennifer’s work spans enterprise security, governance and compliance, privacy, and AI governance, with deep experience guiding organizations through complex environments including digital transformation, cloud modernization, and regulatory evolution. She is known for transforming security into a strategic business enabler, helping organizations strengthen customer trust, support revenue-enabling compliance, and manage risk through clear, actionable decision making.Jennifer writes about cybersecurity leadership, risk governance, privacy, and the evolving role of security in modern digital infrastructure, with a focus on building resilient, scalable programs that align technology, risk, and business strategy.

Lorem Ipsum Dolor Sit

Vel sed vitae enim nec suspendisse ut viverra tincidunt quis

Learn More

Related Articles

Addressing New PCI DSS 4.0 Security Concerns With Payments Orchestration

Payment Security

Rachel Fine

November 22, 2023

Arc’teryx and the 2019 PSD2 Mandate

Payment Security

Lorra Gosselin

June 23, 2020

Benefits of Performing Security Risk Assessments

Payment Security

Aaron Finley

June 15, 2022

Back to Blog

Get Regular Updates From Payments Experts

Subscribe to our newsletter and we’ll send you a monthly update of all of our new content so you don’t miss out on new data, new insights, and news from the world of payments. 

Insights and updates you actually care about

By subscribing, you agree to our Privacy Policy and Terms.

Find Us On

Company
  • Pricing
  • About
  • Careers
  • Contact Us
  • Partners
Resources
  • Support
  • Guides
  • FAQ
  • News
  • Webinars
  • Trust Center
Developers
  • Developer Guides
  • Documentation
  • See Demo
  • Status

Find Us On

Privacy SettingsTermsPrivacyStatus
© 2026 Spreedly, Inc. All rights reserved.