<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Kratika | Payment Systems & Engineering Leadership]]></title><description><![CDATA[Payment systems infrastructure, compliance, and engineering leadership.]]></description><link>https://kratikajain.com</link><image><url>https://cdn.hashnode.com/uploads/logos/69e52c6413e74eec5844b8cb/8aa2f2c0-b131-455d-bee9-21526b1cfb7d.png</url><title>Kratika | Payment Systems &amp; Engineering Leadership</title><link>https://kratikajain.com</link></image><generator>RSS for Node</generator><lastBuildDate>Mon, 11 May 2026 03:11:10 GMT</lastBuildDate><atom:link href="https://kratikajain.com/rss.xml" rel="self" type="application/rss+xml"/><language><![CDATA[en]]></language><ttl>60</ttl><item><title><![CDATA[The PSD2 participants map]]></title><description><![CDATA[A single payment flow, like customer paying at an outlet, can involve five different types of participants; each with different system boundary, security requirements, data obligations, and liability ]]></description><link>https://kratikajain.com/the-psd2-participants-map</link><guid isPermaLink="true">https://kratikajain.com/the-psd2-participants-map</guid><dc:creator><![CDATA[Kratika Jain]]></dc:creator><pubDate>Sun, 10 May 2026 23:16:31 GMT</pubDate><enclosure url="https://cdn.hashnode.com/uploads/covers/69e52c6413e74eec5844b8cb/80fa9be0-c45e-488c-971d-5e12016aade2.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>A single payment flow, like customer paying at an outlet, can involve five different types of participants; each with different system boundary, security requirements, data obligations, and liability exposure.</p>
<p>Who are you in that flow determines what needs to be build, what regulatory evidence is required, and what is your responsibility when something goes wrong.</p>
<blockquote>
<p><em><strong>The</strong></em> <a href="https://kratikajain.com/primer"><em><strong>primer</strong></em></a> <em><strong>introduced the taxonomy, extended to a depth in this article.</strong></em></p>
</blockquote>
<blockquote>
<p><strong>Accuracy note:</strong> This article covers PSD2 as currently in force. PSD3 and PSR are not yet published in the EU Official Journal.</p>
</blockquote>
<hr />
<h3><strong>Ecosystem as a glance</strong></h3>
<p>Before we dive into the breakdown of each role, it helps to understand to see how the participants relate to each other in a typical open banking flow.</p>
<img alt="" style="display:block;margin:0 auto" />

<p>Each arrow in the diagram represents an engineering interface, like a consent flow, authenticated API call, a payment instruction, or a status callback.</p>
<hr />
<h3><strong>ASPSP (Account Servicing Payment Service Provider)</strong></h3>
<p>The institution that holds the customer’s payment account, like banks, licensed payment institutions, etc. Under PSD2, ASPSPs must give licensed TPPs (explained below) access to account data and payment initiation via a dedicated API, &amp; with customer consent.</p>
<p><em><strong>What ASPSPs must build?</strong></em></p>
<ul>
<li><p><strong>Dedicated TPP-API:</strong> separate from customer facing interface, exposed API with equivalent data quality and availability.</p>
</li>
<li><p><strong>SCA &amp; consent handoff:</strong> the ASPSP owns the customer authentication, and a TPP cannot perform SCA on its behalf.</p>
</li>
<li><p><strong>Account data exposure:</strong> Expose to the TPP via API the balances &amp; transaction history, current and consistent with what customer sees directly at ASPSP’s platform/app.</p>
</li>
<li><p><strong>Fallback &amp; contingency mechanism:</strong> a defined path for TPPs when the primary interface is unavailable.</p>
</li>
</ul>
<p>***System boundaries<br />***ASPSP owns the accounts, the authentication, and the API. What the TPP does with the data and/or the initiated payment is outside it’s boundary.</p>
<hr />
<h3><strong>AISP (Account Information Service Provider)</strong></h3>
<p>A licensed TPP that reads the payment account data from ASPSP’s API on customer’s behalf, like personal finance apps, credit decisioning tools, accounting integrations, etc. AISPs never initiate payments or touch the funds.</p>
<p><em><strong>What AISPs must build?</strong></em></p>
<ul>
<li><p><strong>Consent lifecycle:</strong> From grant, scope, expiry to renewal and revocation, all status-flow of consent are handled and should be auditable.</p>
</li>
<li><p><strong>eIDAS certificate management:</strong> Secure API connectivity via QWAC for TLS &amp; QSeal for request signing. Certificate provisioning, renewal, revocation &amp; monitoring is all AISPs responsibility.</p>
</li>
<li><p><strong>Data minimisation:</strong> Only allowed to retrieve and store data that is necessary for the stated purpose.</p>
</li>
<li><p><strong>90-days re-authentication flow:</strong> Requires re-authentication every 90 days for ongoing data access, manage the prompting before expiry, and stop access is customer doesn’t re-authenticate.</p>
</li>
<li><p><strong>Access revocation:</strong> If customer revokes consent, data access must stop immediately, and any cached data outside the consented scope must be deleted or quarantined.</p>
</li>
</ul>
<p>***System boundaries<br />***The AISP owns consent, data retrieval, and storage. The ASPSP owns authentication and the data source.</p>
<hr />
<h3><strong>PISP (Payment Initiation Service Provider)</strong></h3>
<p>A licensed TPP that initiates payments from a customer account (without ever holding the funds). PISP creates and sends the payment instruction to ASPSP for execution.</p>
<p><em><strong>What PISPs must build?</strong></em></p>
<ul>
<li><p><strong>Payment initiation flow:</strong> a technical flow involving customer consenting to payment, sending signed payment initiation request to ASPSP, SCA handoff, and status callback handling.</p>
</li>
<li><p><strong>Payment status tracking:</strong> after initiation, status is tracked through to completion or failure via status model to handle and communicate received, pending, executed, rejected, and error states clearly to customers.</p>
</li>
<li><p><strong>Redirect &amp; decoupled:</strong> different ASPSPs can implement different authentication mode, redirect to ASPSPs interface and/or authenticate via separate channel/device. PISP needs to support both.</p>
</li>
<li><p><strong>Non-repudiation:</strong> PISP requests must be signed using a QSeal so the ASPSP can prove the instruction came from a licensed entity. This creates a non-repudiation record, if a payment is disputed, the signed request is the evidence that the PISP sent a legitimate instruction.</p>
</li>
</ul>
<p>***System boundaries<br />***The PISP owns the initiation request, status tracking, and consent evidence. The ASPSP owns authentication and execution. If the PISP initiates without valid consent, the liability sits with the PISP.</p>
<hr />
<h3><strong>EMI (Electronic Money Institution)</strong></h3>
<p>A licensed entity that issues electronic money, i.e., a stored monetary value representating a claim on the issuer. Examples are prepaid wallets, stored value accounts, multi-currency wallets etc.</p>
<p><em><strong>What EMIs must build?</strong></em></p>
<ul>
<li><p><strong>Double-entry ledger:</strong> accurate to the last unit of currency, reconciled in real time, and auditable at any point in history.</p>
</li>
<li><p><strong>Safeguarding evidence:</strong> 100% coverage ratio, real time reconciliation of customer balances and producible on demand.</p>
</li>
<li><p><strong>Redemption flow:</strong> customers can redeem e-money at par at any time, the flow must be reliable, auditable, and independent of systems that might be failing.</p>
</li>
<li><p><strong>Concurrency control:</strong> wallet balances under concurrent load require pessimistic locking or equivalent, race conditions that result in negative balances, phantom credits, or double debits are regulatory failures, not just system defects.</p>
</li>
</ul>
<p>***System boundaries<br />***The EMI owns the ledger, safeguarding, and balance integrity of the e-money issued. An EMI providing payment initiation additionally owns all PISP obligations.</p>
<hr />
<h3><strong>PI (Payment Institution)</strong></h3>
<p>It is a licence category, not a functional role. A non-banking entity, authorised to provide payment services, like executing transactions, money remittances, acquiring, payment initiation etc.<br />PI licence is a legal wrapper, many PISPs are authorised PIs. What PIs must build depends on the payment service they provide, but there are certain common obligations across all PIs.</p>
<p><em><strong>What all PIs must build?</strong></em></p>
<ul>
<li><p><strong>Safeguarding:</strong> PIs holding customers funds must safeguard them separately than firm’s own funds, in a designated account. The ledger must be able to produce real time reconciliations at any given time.</p>
</li>
<li><p><strong>Incident detection &amp; reporting:</strong> PIs must report major operational or security incidents to their NCA. Proper incident report involving detection, classification, evidence packaging needs to be generated within EBA-defined timelines.</p>
</li>
<li><p><strong>Fraud monitoring &amp; reporting:</strong> transaction monitoring, fraud classification, and reporting pipelines are regulatory obligations, and statistical fraud data report is annual submission to NCA.</p>
</li>
<li><p><strong>Operational control evidence:</strong> access management, change management, business continuity, and outsourcing oversight, should be documented and demonstrable</p>
</li>
</ul>
<hr />
<h3><strong>Expected changes in PSR</strong></h3>
<p>Two participant-level changes are confirmed in November 2025 agreement.</p>
<ul>
<li><p><strong>For ASPSPs:</strong> Performance parity between the TPP interface and the customer-facing interface becomes a hard obligation, not a principle. The fallback to screen scraping is removed. ASPSPs must also provide a customer-facing dashboard of which TPPs have active consent and the ability to revoke them.</p>
</li>
<li><p><strong>For PISPs:</strong> The Verification of Payee obligation means PISPs initiating credit transfers must check payee name against IBAN before executing. If a mismatch is detected and not flagged to the customer, the PISP bears liability for any resulting misdirected payment.</p>
</li>
</ul>
<hr />
]]></content:encoded></item><item><title><![CDATA[Your hero-engineer might be your biggest operational risk!]]></title><description><![CDATA[There is a type of engineer almost every company has.
The person who gets pulled into every serious incidents, knows which service is actually failing just looking at the dashboards, or who can SSH at]]></description><link>https://kratikajain.com/hero-engineer-biggest-risk</link><guid isPermaLink="true">https://kratikajain.com/hero-engineer-biggest-risk</guid><dc:creator><![CDATA[Kratika Jain]]></dc:creator><pubDate>Sun, 10 May 2026 22:28:21 GMT</pubDate><enclosure url="https://cdn.hashnode.com/uploads/covers/69e52c6413e74eec5844b8cb/d59427f8-bb92-42cb-84fa-3eeebd6988ea.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>There is a type of engineer almost every company has.</p>
<p>The person who gets pulled into every serious incidents, knows which service is actually failing just looking at the dashboards, or who can SSH at 2am and somehow stabilises the system before leadership and stakeholders wake up.</p>
<blockquote>
<p>Most organisations aim to build resilient systems, while they actually reward the resilient engineer.</p>
</blockquote>
<hr />
<h3>Hero-driven reliability</h3>
<p>Some systems are not reliable because they are well-designed, but because one person refuses to let them fail. That person knows the edge cases not in any documentation, possess a mental model of production system that exists nowhere else, and get paged more often as they're the only one who can interpret the incident.</p>
<p>In a regulated industry like fintech, this is alarming; not just operationally, but also regulatory. A system whose resilience depends on one person's availability or attention is not an operationally stable system.</p>
<hr />
<h3>What happens to the team around the <em>hero</em>?</h3>
<p>Teams with permanent <em>hero-on-demand</em> eventually lose their investigative capabilities and depth. And it will not happen at once, or immediately, but by small decisions that each would make sense and reasonable at the time.</p>
<p>Someone starts to defer to the hero before fully investigating a problem themselves, someone else stops reading the architecture documentation because they know they can just ask.</p>
<p>The hero, to their credit, usually continues helping. They are often generous people who genuinely want to solve problems. But the accumulation of these small deferrals creates something structural: the team quietly replaces documentation with a person.</p>
<p><strong>And then there is another team dynamics, nobody likes talking about</strong> - the <em><strong>quiet resentment</strong></em> building up in competent engineers who aren't hero, but know that with better system, planning, and knowledge distribution, the team and the system won't even need the constant saving. This rarely surfaces as direct conflict, but disengagement, and eventually them deciding that the team is not a place for them to grow.</p>
<hr />
<h3>Hero identity - the psychological angle</h3>
<p>Not every hero engineer is protecting knowledge intentionally. In fact, it usually starts from a healthy space - they care deeply, move quickly, feel personally responsible for outcomes and genuinely want the system and team to succeed.</p>
<p>The organisation starts rewarding behaviour repeatedly, visibility increases, leadership trust increases, and their opinions start carrying more weight. After some time -</p>
<blockquote>
<p>Some engineers stop experiencing it as a burden, and start experiencing it as an identity.</p>
</blockquote>
<p>The act of sharing knowledge is treated as an act of sharing status and relevance, because once someone becomes professionally recognised as <em>“the person who saves things,”</em> distributing knowledge can start to feel strangely threatening.</p>
<p>Organisations that do not recognise this dynamic will keep treating it as a knowledge management problem. While it is a status and recognition problem, that cannot be solved with just better documentation tooling.</p>
<hr />
<h3>A version darker than individual psychology</h3>
<p>Some companies are structured in a way, that certain systems are genuinely under-resourced for the load they expect to carry. The technical debt is real, but the team is too small. The incident rates are high, and so is the gap between <em><strong>"what the system needs" vs "what the organisation has allocated".</strong></em></p>
<p>In these environments, <em>heroism</em> is not a cultural problem, but a resource problem. The arrangement works until it doesn't. Because people leave, or just quietly stops caring.</p>
<p>Another major structural issue is <strong>creating a prestige system around operational sufferings</strong>, because calm systems do not generate enough visibility, or nobody applauds a migration where nothing interesting happened. Once the organisation starts emotionally rewarding firefighting than prevention, it is one step closer to permanent operational chaos.</p>
<hr />
<h3>It's not always a RED FLAG</h3>
<p>In an early-stage startups, some degree of heroism is unavoidable, or required. For the first 2-3 years of a company, the systems are immature, teams are small, well-defined processes do not exist yet, and the company is still trying to capture the maximum of market.</p>
<blockquote>
<p>In such environments, someone stepping up, to hold things together through force of will, is not dysfunction, it is survival and necessary.</p>
</blockquote>
<p>Problem arises when some companies never evolve beyond that stage psychologically, even after they evolve operationally.</p>
<p>And even in mature systems, genuine crises warrant genuine recognition. An extraordinary incident handled with extraordinary effort deserves public acknowledgment. The problem is not the recognition.</p>
<blockquote>
<p>The moment heroism shifts from exceptional to expected, from "this person did something remarkable" to "this is how we operate", something has gone wrong.</p>
</blockquote>
<hr />
<h3>What mature engineering culture and organisations look like?</h3>
<p>Good engineering organisations still recognise heroic effort, and <strong>they should</strong>.</p>
<p>Real incidents happen, system unexpectedly fails, and these are the moments where intervention is genuinely protects customers and business. But the mature culture treats heroism as -</p>
<blockquote>
<p>An exception to defend business, and not a cultural identity.</p>
</blockquote>
<p>As system grows, the incidents become less, recovery become predictable, operational knowledge is distributed, and perhaps, more importantly, <strong>people preventing or putting out the fire are equally valued as much as the people building the system</strong>.</p>
<hr />
<h3>The uncomfortable part</h3>
<p>Organisations that want to fix this usually start by talking about documentation, runbooks, on-call rotations etc. While these things definitely matter majorly, there is another question to think about - <strong>how does your reward system look like?</strong></p>
<p>If the engineer who quietly prevented three incidents last quarter received less visibility than the engineer who dramatically resolved one, company is already setting up a precedent of behaviour they prefer incentivising.</p>
<blockquote>
<p>Some organisations subconsciously prefer heroes because fixing systems structurally is expensive, politically difficult, and invisible.</p>
</blockquote>
<hr />
]]></content:encoded></item><item><title><![CDATA[Do you need a PSD2 licence?]]></title><description><![CDATA[One of the easiest mistake by a payments/fintech startup is to start with the product flow and leave the regulatory model for later. This may sound practical at the beginning to build the app/platform]]></description><link>https://kratikajain.com/do-you-need-a-psd2-licence</link><guid isPermaLink="true">https://kratikajain.com/do-you-need-a-psd2-licence</guid><dc:creator><![CDATA[Kratika Jain]]></dc:creator><pubDate>Sat, 09 May 2026 22:35:01 GMT</pubDate><enclosure url="https://cdn.hashnode.com/uploads/covers/69e52c6413e74eec5844b8cb/4ec3f8cd-1345-4f3b-9b8f-e242a5c448e3.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>One of the easiest mistake by a payments/fintech startup is to start with the product flow and leave the regulatory model for later. This may sound practical at the beginning to build the app/platform, integrate with bank, &amp; sort the compliance when traction appears. In reality, the order can become expensive very quickly.</p>
<blockquote>
<p>PSD2 is not just a regulatory document, it shapes what the system is allowed to do, who can touch funds, who can access account data, who authenticates the customer, who owns consent, who keeps evidence, &amp; and who is liable if (or when) something goes wrong.</p>
</blockquote>
<hr />
<blockquote>
<p><strong>NOTE: This article is a practical engineering overview, not legal advice. PSD2 remains the current EU framework. PSD3 and PSR reached political agreement in November 2025 but are not yet in force. For actual authorisation decisions, firms should work with counsel and the relevant national competent authority.</strong></p>
</blockquote>
<h2>Core distinction</h2>
<p><em><strong>"We help users pay merchants." "We connect to bank accounts." "We aggregate balances." "We route payments." "We help businesses collect money." "We provide payment infrastructure."</strong></em></p>
<p>All these are product-language, and not regulatory activities. The main question is whether the product is doing, or causing another party to do any of the following:</p>
<ul>
<li><p>Accessing payment account information</p>
</li>
<li><p>Initiating payments from a user's account</p>
</li>
<li><p>Executing credit transfers or direct debits</p>
</li>
<li><p>Issuing payment instruments</p>
</li>
<li><p>Acquiring payment transactions</p>
</li>
<li><p>Transmitting money</p>
</li>
<li><p>Issuing or managing electronic money</p>
</li>
<li><p>Holding or safeguarding customer funds</p>
</li>
</ul>
<p>The closer your product gets to account access, payment initiation, fund movement, or stored value, the more likely you are entering regulated territory.</p>
<hr />
<h2>Three common models of startup</h2>
<h3>Technical service provider</h3>
<p>In this model, the system provides the technology to a regulated entity, but do not provide the regulated payment service itself. Examples like <strong>fraud tooling, payment analytics, workflow automation, merchant reporting tools</strong>, etc.</p>
<p>To avoid this system to cross into regulated activities, following points are to consider -</p>
<ul>
<li><p><em>Do we ever enter into possession or control of funds?</em></p>
</li>
<li><p><em>Do we initiate the payment instruction ourselves?</em></p>
</li>
<li><p><em>Do we access user's account data?</em></p>
</li>
<li><p><em>Are we customer-facing as the provider of the payment service?</em></p>
</li>
<li><p><em>Are we makign decisions effecting the payment execution?</em></p>
</li>
</ul>
<p>From engineering view, such systems are designed as a support layer, not regulated execution layer.</p>
<h3>Operating under a licensed partner</h3>
<p>It's a common model for startups to launch fast. Instead of becoming authorized directly, the startup/organisation partner with a licensed payment institution, e-money institution, bank, or, a regulated provider. The product operates on top of their licence.</p>
<p>It can reduce the 'time-to-market', but does not remove engineering responsibility, only splits them between partner and product.</p>
<p>Licensed partner usually cares about -</p>
<ul>
<li><p>how the onboarding works</p>
</li>
<li><p>how customers are authenticated</p>
</li>
<li><p>what data the product collects</p>
</li>
<li><p>what funds flow through the system</p>
</li>
<li><p>how transactions are monitored</p>
</li>
<li><p>how incidents are reported</p>
</li>
<li><p>what audit evidence you can produce</p>
</li>
<li><p>how quickly they can shut down or control risky activity</p>
</li>
</ul>
<p>Even if you don't own the licence, <strong>engineering implication</strong> is building the system to satisfy the licensed partner's compliance and operational requirements, which typically includes -</p>
<ul>
<li><p>partner approval workflows</p>
</li>
<li><p>role-based access controls</p>
</li>
<li><p>event logs and audit trails</p>
</li>
<li><p>operational dashboards</p>
</li>
<li><p>transaction monitoring feeds</p>
</li>
<li><p>reconciliation support</p>
</li>
<li><p>incident escalation hooks</p>
</li>
<li><p>customer-data controls</p>
</li>
</ul>
<h3>Becoming directly authorised or registered</h3>
<p>This is the heavier route, you become the regulated entity yourself: a payment institution, e-money institution, account information service provider, or payment initiation service provider.</p>
<p>This model gives more control, but also more responsibilities. You should be able to demonstrate that business can safely provide the payment service, not just as a legal exercise but an engineering evidence exercise as well.</p>
<p>This includes following -</p>
<ul>
<li><p>secure system architecture</p>
</li>
<li><p>customer authentication controls</p>
</li>
<li><p>incident management process</p>
</li>
<li><p>operational resilience</p>
</li>
<li><p>data protection controls</p>
</li>
<li><p>outsourcing controls</p>
</li>
<li><p>safeguarding arrangements where relevant</p>
</li>
<li><p>financial crime and fraud controls</p>
</li>
<li><p>governance and auditability</p>
</li>
</ul>
<hr />
<h2>Registering as PI, EMI, AISP or PISP: The practical difference</h2>
<p>You have decided to go with model 3 and register yourself directly as a regulated entity. The exact authorisation or registration model depends on what your product does.</p>
<h3>Payment institution (PI)</h3>
<p>A Payment Institution provides payment services such as executing payment transactions, money remittance, payment initiation, or acquiring, depending on the permissions granted.</p>
<p>This may be relevant if your product is directly involved in moving money but does not issue e-money or take deposits like a bank.</p>
<p>Engineering focus areas typically include:</p>
<ul>
<li><p>transaction lifecycle management</p>
</li>
<li><p>reconciliation</p>
</li>
<li><p>safeguarding support where applicable</p>
</li>
<li><p>fraud monitoring</p>
</li>
<li><p>customer authentication</p>
</li>
<li><p>incident evidence</p>
</li>
<li><p>operational controls</p>
</li>
</ul>
<h3>Electronic money institution (EMI)</h3>
<p>An Electronic Money Institution issues electronic money: stored monetary value representing a claim on the issuer. This may be relevant if your product involves customer balances, wallets, stored value, prepaid-style accounts, or funds held for future payment use.</p>
<p>Engineering focus areas typically include:</p>
<ul>
<li><p>wallet ledger design</p>
</li>
<li><p>balance integrity</p>
</li>
<li><p>safeguarding evidence</p>
</li>
<li><p>redemption flows</p>
</li>
<li><p>transaction history</p>
</li>
<li><p>reconciliation</p>
</li>
<li><p>access controls</p>
</li>
<li><p>customer-money reporting</p>
</li>
</ul>
<p>If the product has anything that looks like a customer balance, stored value, or wallet, you should examine the EMI question very early.</p>
<h3>Account information service provider (AISP)</h3>
<p>An Account Information Service Provider accesses account information from payment accounts, with the customer's permission.</p>
<p>This may be relevant if the product reads balances, transaction history, income data, or account details from banks to provide insights, dashboards, affordability checks, or aggregation.</p>
<p>Engineering focus areas typically include:</p>
<ul>
<li><p>consent lifecycle</p>
</li>
<li><p>account-data retrieval</p>
</li>
<li><p>data minimisation</p>
</li>
<li><p>refresh logic</p>
</li>
<li><p>secure storage</p>
</li>
<li><p>access audit trails</p>
</li>
<li><p>API error handling</p>
</li>
<li><p>customer revocation flows</p>
</li>
</ul>
<p>AISP doesn't move the money, but the data is sensitive, and the consent and security model matters.</p>
<h3>Payment initiation service provider (PISP)</h3>
<p>A Payment Initiation Service Provider initiates a payment from the customer's account held at an ASPSP.</p>
<p>This may be relevant if your product allows a user to pay a merchant, move money, or trigger a bank transfer without using card rails.</p>
<p>Engineering focus areas typically include:</p>
<ul>
<li><p>payment initiation flow</p>
</li>
<li><p>customer authentication handoff</p>
</li>
<li><p>payment status tracking</p>
</li>
<li><p>failure handling</p>
</li>
<li><p>redirect or decoupled flow support</p>
</li>
<li><p>reconciliation touchpoints</p>
</li>
<li><p>fraud and risk controls</p>
</li>
<li><p>customer messaging</p>
</li>
</ul>
<p>PIS is operationally more sensitive than AIS because a payment instruction is being initiated. That makes status handling, traceability, and failure handling much more important.</p>
<p>Many early-stage products start as PISP-style flows and later evolve into PI-style systems as they take on more control over money movement.</p>
<hr />
<h2>Build vs Partner decision</h2>
<p>Before you decide which licence to get for, the question to ask yourself is:</p>
<p><em><strong>"Under which regulatory model can we build, launch, learn, and control the right things at the right time?"</strong></em></p>
<p>A direct licence gives control, but takes time and operational maturity. A partner model gives speed, but reduces control and introduces dependency. A technical-service-provider model can work well, but only if the regulated boundary is genuinely outside your product.</p>
<p>The right answer depends on the product, the funding stage, the market, and how close the product is to regulated activity.</p>
<hr />
<h2>Common mistakes to avoid</h2>
<ol>
<li><p><strong>Assuming "we do not hold funds" means PSD2 does not matter:</strong> Not holding funds may reduce some obligations, but PSD2 also covers account information and payment initiation services. A product can be in scope without holding customer money.</p>
</li>
<li><p><strong>Treating the licence as a legal wrapper:</strong> The licence model is not just a document to attach to the product, it changes what the system must prove, log, secure, and control.</p>
</li>
<li><p><strong>Choosing a partner without understanding technical dependency:</strong> A licensed partner can accelerate launch, but it can also define your product constraints. Their APIs, controls, approval process, incident requirements, and reporting expectations become part of your architecture.</p>
</li>
<li><p><strong>Designing the MVP before defining the regulated boundary:</strong> A payment MVP is not just a thin product experiment. If it touches payment initiation, funds, account data, or stored value, the MVP already contains regulated-system decisions, without boundary-settings.</p>
</li>
<li><p><strong>Assuming PSD3/PSR is a reason to wait:</strong> PSD2 is still the current framework. PSD3/PSR matters for future readiness, but startups building now still need to understand PSD2 first.</p>
</li>
</ol>
<hr />
<h2>Before you lock the architecture</h2>
<p>These five things should happen before serious architecture decisions are made.</p>
<ol>
<li><p><strong>Draw the money flow:</strong> Show where and how funds move, who controls them, where they settle, and whether your system ever has possession or control of them.</p>
</li>
<li><p><strong>Draw the data flow:</strong> Show which account data your system access, where it comes from, where and how is it stored, who can see/access it, and how the consent is captured and revoked.</p>
</li>
<li><p><strong>Draw the control flow:</strong> Show who initiates the payments, who authenticates the customer, who can block the transactions, who monitors fraud, and who handles failure or refunds.</p>
</li>
<li><p><strong>Map your regulatory role:</strong> Identify whether you are acting as a technical service provider, partner of a licensed firm, AISP/PISP/EMI. If you're not sure, this lack of clarity is itself a finding.</p>
</li>
<li><p><strong>Decide what you own now vs later:</strong> Be explicit about which regulated capabilities are owned internally and/or by a partner, what are deferred for now, and what capabilities are not applicable. A partner model to permanently outsource the ledger, SCA etc is a different long-term position than the one that defers them temporarily.</p>
</li>
</ol>
<hr />
]]></content:encoded></item><item><title><![CDATA[PSD2, PSD3 & PSR: Starting point]]></title><description><![CDATA[Working in fintech for more than a decade made me realize, system architecture is not the hardest part for building a payments infrastructure, but understanding regulatory changes, messy terminology a]]></description><link>https://kratikajain.com/primer</link><guid isPermaLink="true">https://kratikajain.com/primer</guid><dc:creator><![CDATA[Kratika Jain]]></dc:creator><pubDate>Fri, 08 May 2026 23:52:40 GMT</pubDate><enclosure url="https://cdn.hashnode.com/uploads/covers/69e52c6413e74eec5844b8cb/76d75baf-ea75-4d3e-8bb0-15f85bb5584d.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Working in fintech for more than a decade made me realize, system architecture is not the hardest part for building a payments infrastructure, but understanding regulatory changes, messy terminology and turning a legal change into engineering work are the real challenges.</p>
<p>This series is focusing on PSD2, PSD3 and PSR; and this primer is a starting point for engineers working around open banking, payment initiations, regulated APIs, and payment systems in EU/UK.</p>
<hr />
<h2>The short version</h2>
<p>The simplest way to think about the landscape is this:</p>
<ul>
<li><p>PSD2: Current regulatory framework (in force since 2018)</p>
</li>
<li><p>PSD3: Next directive, mainly focused on licensing, supervision, and the institutional structure (agreed Nov 2025)</p>
</li>
<li><p>PSR: Sits alongside PSD3 for day-to-day conduct around access, authentication, &amp; user-protection rules.</p>
</li>
</ul>
<p>This split is one of the first things engineers need to understand.</p>
<hr />
<h2>The detailed landscape: what exists and what’s coming</h2>
<h3>PSD2: The second payment services directive (2018)</h3>
<p>It is the current law, a revised and extended verion for PSD1 with following two major additions:</p>
<ol>
<li><p><strong>Open Banking:</strong> PSD2 enabled licensed third parties to access payment-related information or initiate a payment, subject to customer’s permissions and regulatory controls.</p>
</li>
<li><p><strong>Strong Customer Authentication (SCA):</strong> PSD2 introduced mandatory multi-factor authentication for electronic payments above certain thresholds, aiming to reduce fraud in card-not-present and online payment contexts.</p>
</li>
</ol>
<p>PSD2 is a <code>directive</code>, meaning each member state transposed it into national law separately, some strictly and some loosely. Post Brexit, UK now operates under its own version (UK PSD2), diverging from EU framework overtime. This inconsistency is one of the primary problems PSD3 + PSR aims to fix.</p>
<h3>PSD3 &amp; PSR: A combined package</h3>
<p>PSD3 in itself is not a replacement of PSD2, it is narrower in space. It primarily covers licensing and prudential framework for payments and e-money institutions, reauthorisation obligations for existing licensed entities, supervisory arrangements between member states, &amp; integration of EMIs into PI category.</p>
<p>PSR is more significant in a way that it is a <code>regulation</code>, and not a directive; which means it is applied directly and uniformly across all member states. It governs transparency obligations around fees, exchange rates etc, strong customer authentication, standardized API requirements, consent dashboards under open banking, &amp; operational and security requirements for PSPs.</p>
<hr />
<h2>The participation map that matters</h2>
<p>Understanding who each participant is, determines which regulatory obligations apply to a given system; because not every player is ‘just a payments company’.</p>
<ul>
<li><p><strong>ASPSP (Account Servicing Payment Service Provider):</strong> the institution holding the customer’s payment account. Banks, building societies, EMIs. Must provide dedicated APIs to licensed TPPs with customer consent.</p>
</li>
<li><p><strong>AISP (Account Information Service Provider):</strong> licensed entity that reads account data from one or more ASPSPs with customer consent. Read-only, and cannot initiate payments.</p>
</li>
<li><p><strong>PISP (Payment Initiation Service Provider):</strong> licensed entity that initiates a payment from a customer’s account at an ASPSP. Does not hold funds, only instructs the ASPSP to execute.</p>
</li>
<li><p><strong>CBPII (Card-Based Payment Instrument Issuer):</strong> issues a payment card linked to an account at an ASPSP. Can check available funds before authorising a transaction.</p>
</li>
<li><p><strong>TPP (Third Party Provider):</strong> umbrella term for AISP, PISP, and CBPII. Engineering obligations include NCA registration, SCA implementation, eIDAS certificate management, and consent lifecycle management.</p>
</li>
<li><p><strong>PI (Payment Institution):</strong> non-bank entity licensed to provide payment services. Can hold customer funds for payment purposes.</p>
</li>
<li><p><strong>EMI (Electronic Money Institution):</strong> licensed to issue electronic money. Under PSD3, becomes a sub-category of PI, so existing EMI licences might require re-application during the transition period.</p>
</li>
</ul>
<hr />
<h2>The other frameworks that cannot be ignored</h2>
<p>PSD2/3/PSR are only a part of a ‘payment ecosystem’, which usually sits at the intersection of following frameworks -</p>
<ul>
<li><p>PSD2/3/PSR: Payment service rules</p>
</li>
<li><p>DORA: Digital operational resilience act</p>
</li>
<li><p>GDPR: General data protection regulation</p>
</li>
<li><p>eIDAS: Electronic identification, authentication and trust service regulation</p>
</li>
</ul>
<hr />
<h2>Why this series</h2>
<p>A technical series for people trying to understand what these frameworks means, in their current and expected legislature. This article is a starting points, that aims to extend into -</p>
<ul>
<li><p>Understanding PSD2 before building</p>
</li>
<li><p>Building PSD2-compliant systems</p>
</li>
<li><p>Prepare for PSD3/PSR migration</p>
</li>
</ul>
<hr />
]]></content:encoded></item></channel></rss>