Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
LABS
Guides

How to Design an AML/CFT Program for a Virtual Asset Custodian

A technical guide for developers and compliance officers on implementing anti-money laundering and counter-terrorist financing controls for a custodial wallet service. Covers risk-based approach, automated CDD, transaction monitoring logic, and integration with regulatory reporting.
Chainscore © 2026
introduction
COMPLIANCE GUIDE

How to Design an AML/CFT Program for a Virtual Asset Custodian

A step-by-step framework for building a risk-based Anti-Money Laundering and Countering the Financing of Terrorism program tailored to the unique challenges of digital asset custody.

An effective AML/CFT program for a crypto custodian is not a generic checklist but a risk-based framework mandated by regulators like FinCEN and the FATF. The core components are Customer Due Diligence (CDD), transaction monitoring, suspicious activity reporting (SAR), and a dedicated compliance officer. Unlike traditional finance, custodians must account for the pseudonymous nature of blockchain addresses, the global reach of transactions, and the specific risks of assets like privacy coins or those from high-risk jurisdictions. The program must be documented in written policies and procedures and receive regular board-level oversight.

The foundation of your program is Customer Identification and Verification (CIP/CDD). This goes beyond collecting a name and requires verifying the customer's identity using reliable, independent source documents. For entities, this means understanding the ownership structure and identifying beneficial owners holding 25% or more. Enhanced Due Diligence (EDD) is required for higher-risk customers, such as Politically Exposed Persons (PEPs), users from high-risk countries, or those dealing in large volumes. A key technical control is screening customers and their wallet addresses against sanctions lists (e.g., OFAC SDN List) and PEP databases using specialized blockchain analytics tools.

Transaction Monitoring is where technology is critical. You must implement a system to identify patterns indicative of money laundering, such as structuring (breaking large transactions into smaller ones), layering (complex transfers to obscure origin), or transactions with sanctioned addresses. Effective rules might flag: deposits from known mixers or gambling sites, rapid movement of funds between multiple wallets with no clear purpose, or transactions just below reporting thresholds. These systems should generate alerts for investigation by your compliance team, who must document their analysis and decide whether to file a Suspicious Activity Report (SAR) with FinCEN.

Your program must include ongoing training for all relevant employees—not just the compliance team—on AML/CFT regulations, internal red flags, and reporting procedures. Furthermore, an independent audit function, either internal or external, should test the program's effectiveness at least annually. The audit should review CDD files, test transaction monitoring alerts, verify SAR filings, and assess overall policy adherence. Findings must be reported to senior management, with a plan to remediate any deficiencies. This cycle of testing and improvement demonstrates a genuine commitment to compliance to regulators.

Finally, integrate your compliance controls directly into the custody technology stack. Use APIs from providers like Chainalysis, Elliptic, or TRM Labs to screen wallet addresses during onboarding and monitor withdrawals in real-time. Implement risk scoring for assets and customers to automate EDD triggers. For example, a withdrawal request to a wallet that has interacted with a darknet market should be automatically flagged for manual review. Log all compliance-related decisions and customer interactions in an immutable audit trail. This technical integration ensures your written policies are actively enforced and scalable.

prerequisites
PREREQUISITES AND REGULATORY FOUNDATIONS

How to Design an AML/CFT Program for a Virtual Asset Custodian

A robust Anti-Money Laundering and Countering the Financing of Terrorism program is a non-negotiable requirement for any licensed virtual asset custodian. This guide outlines the core components and practical steps for building a compliant framework.

The foundation of an effective AML/CFT program is a formal, board-approved AML/CFT Policy. This document must articulate your firm's risk appetite, define key roles like the Money Laundering Reporting Officer (MLRO), and establish the governance structure. It should be tailored to your specific custodial activities, whether you're holding assets for institutional clients, powering a wallet-as-a-service product, or facilitating staking. Reference frameworks from the Financial Action Task Force (FATF) and your local regulator, such as FinCEN's guidance for US entities or the Travel Rule requirements, to ensure alignment with international standards.

A Risk-Based Approach (RBA) is the cornerstone of modern AML/CFT compliance. You must conduct a thorough Enterprise-Wide Risk Assessment (EWRA). This involves identifying and documenting risks across three key dimensions: Customer Risk (e.g., Politically Exposed Persons, high-net-worth individuals from high-risk jurisdictions), Product/Service Risk (e.g., privacy coins, cross-chain bridging services you enable), and Geographic Risk (countries with weak AML regimes). The output is a risk-rating matrix that dictates the level of due diligence required, ensuring resources are allocated efficiently to higher-risk areas.

Customer Due Diligence (CDD) is your first line of defense. For all clients, collect and verify Know Your Customer (KYC) information: legal name, address, date of birth, and official identification. For corporate clients, this extends to Beneficial Ownership verification, identifying individuals who own or control more than 25% of the entity. Implement automated checks against sanctions lists (OFAC, UN) and PEP databases. For higher-risk clients, Enhanced Due Diligence (EDD) is required, involving deeper investigation into the source of funds and wealth, and more frequent transaction monitoring.

Transaction monitoring must be continuous and intelligent. Define red-flag indicators specific to custody, such as rapid inbound deposits from high-risk exchanges followed by immediate withdrawals to a different chain, or structuring deposits to avoid reporting thresholds. Use on-chain analytics tools like Chainalysis or Elliptic to trace the provenance of assets and screen wallet addresses. Your system should generate Suspicious Activity Reports (SARs) for internal review by the MLRO, who must then file reports with the Financial Intelligence Unit (FIU) if warranted, adhering to strict timelines.

Ongoing training and independent testing are critical for program health. Provide annual AML/CFT training to all employees, with role-specific modules for compliance staff, client onboarding teams, and engineers. An independent audit, conducted at least every 12-18 months by a qualified third party, must test the program's design and operational effectiveness. The audit report should be presented to senior management, with findings addressed through a formal remediation plan. Maintain detailed records of all CDD information, risk assessments, training logs, and SAR filings for the minimum period required by law, typically five to seven years.

risk-assessment-framework
RISK ASSESSMENT FRAMEWORK

How to Design an AML/CFT Program for a Virtual Asset Custodian

A robust Anti-Money Laundering (AML) and Counter-Financing of Terrorism (CFT) program begins with a foundational risk assessment. This guide outlines the systematic process for identifying, analyzing, and mitigating the specific financial crime risks faced by a virtual asset custodian.

The cornerstone of any effective compliance program is a formal, documented Risk Assessment Framework (RAF). For a custodian, this is not a one-time exercise but a living process that must be reviewed and updated at least annually or when significant changes occur. The primary goal is to identify the specific money laundering and terrorist financing risks inherent to your business model, customer base, geographic exposure, and the virtual assets you support. This risk-based approach ensures that your compliance resources are allocated efficiently to the areas of highest threat.

Begin by mapping your business activities. Document all services: custodial wallet management, staking, delegation, fiat on/off-ramps, and any cross-chain bridging support. For each service, identify the associated risks. For example, non-custodial staking delegation may carry lower direct risk than managing private keys for pooled assets. Next, conduct a customer risk assessment. Segment your users by type (e.g., retail, institutional, VASP), geography (using FATF's high-risk jurisdiction lists), and transaction patterns. A politically exposed person (PEP) transacting from a high-risk country presents a different risk profile than a verified retail user in a compliant jurisdiction.

The third pillar is a virtual asset risk assessment. Not all blockchains or tokens are equal from a compliance perspective. Assess assets based on their inherent traceability (e.g., Bitcoin vs. privacy coins like Monero), the regulatory clarity of their underlying network, and their adoption in illicit activities (referring to reports from firms like Chainalysis or Elliptic). A custodian offering support for assets on privacy-focused Layer 1 networks must implement enhanced controls compared to those holding only assets on fully transparent chains like Ethereum or Solana.

Synthesize these findings into a risk matrix. Plot identified risks on axes of likelihood and potential impact to create a heat map. This visualization prioritizes risks, allowing you to tailor your control measures. For a high-likelihood, high-impact risk—such as onboarding a VASP from an unregulated jurisdiction—you might require enhanced due diligence (EDD), transaction monitoring with lower thresholds, and senior management approval. For lower-tier risks, standard due diligence may suffice. Document all assumptions, data sources, and scoring methodologies.

Finally, translate the risk assessment into actionable policies. Your RAF should directly inform the design of your Customer Due Diligence (CDD) procedures, transaction monitoring rules, and suspicious activity reporting (SAR) protocols. For instance, if your assessment flags cross-chain swaps as high-risk, your monitoring system should be configured to flag large, rapid movements of assets across multiple blockchain addresses post-swap. The framework must be approved by the Board or senior management, demonstrating a top-down commitment to compliance, and be made available to regulators upon request.

RISK FACTOR WEIGHTING

Customer Risk Scoring Matrix

A weighted scoring framework for assessing customer risk based on FATF recommendations and industry best practices.

Risk FactorLow Risk (1-2 pts)Medium Risk (3-4 pts)High Risk (5 pts)

Customer Identity Verification

Government-issued ID + proof of address

ID only, or address verification pending

Unverified or anonymous (e.g., privacy wallet)

Source of Funds/Wealth

Verifiable employment or business income

Inheritance or gifts (documented)

Unclear or high-risk jurisdictions

Transaction Volume & Frequency

< $10k monthly, predictable patterns

$10k - $100k monthly, moderate variance

$100k monthly, erratic, high velocity

Geographic Jurisdiction

FATF-compliant, low-risk country

Jurisdiction with developing AML/CFT regime

High-risk/FATF blacklisted jurisdiction

Nature of Business/Occupation

Salaried employee, regulated profession

Business owner, crypto-native role

PEP, cash-intensive business, gambling

Wallet & Transaction Behavior

Custodial or verified wallet, direct fiat on/off-ramps

Mix of custodial and non-custodial wallets

Primarily non-custodial, interacts with mixers or sanctioned addresses

cdd-kyc-implementation
COMPLIANCE FRAMEWORK

Step 2: Implementing Customer Due Diligence (CDD/KYC)

Customer Due Diligence (CDD) is the cornerstone of any Anti-Money Laundering (AML) program for a virtual asset custodian. This step involves verifying customer identities, assessing risk, and establishing an ongoing monitoring framework.

The core of CDD is the Know Your Customer (KYC) process. For a custodian, this involves collecting and verifying personally identifiable information (PII). For individuals, this includes full legal name, date of birth, residential address, and a government-issued ID number. For corporate clients, you must identify the beneficial owners—the natural persons who ultimately own or control the entity—typically those with more than a 25% ownership stake. Verification is done by cross-referencing submitted documents (e.g., passport, utility bill) with data from trusted third-party providers or official databases. The goal is to establish a reasonable belief that you know who your customer is.

Not all customers pose the same risk. A risk-based approach (RBA) is mandated by regulators like the Financial Action Task Force (FATF). You must assign a risk rating (e.g., Low, Medium, High) based on factors like the customer's jurisdiction, source of wealth, intended account activity, and the type of virtual assets involved. A politically exposed person (PEP) or a customer from a high-risk jurisdiction would automatically trigger Enhanced Due Diligence (EDD). EDD requires deeper investigation into the source of funds and the purpose of the business relationship, with approval from senior management.

CDD is not a one-time event. You must implement ongoing transaction monitoring to detect suspicious activity that deviates from a customer's expected behavior. This involves setting thresholds and behavioral rules. For example, monitoring for rapid deposits and withdrawals ("smurfing"), transactions with sanctioned addresses listed on the Office of Foreign Assets Control (OFAC) Specially Designated Nationals (SDN) list, or transfers to high-risk mixers. Alerts from this system must be reviewed, and any confirmed suspicious activity reported via a Suspicious Activity Report (SAR) to the relevant financial intelligence unit.

From a technical standpoint, KYC workflows can be automated using APIs from specialized providers like Jumio, Onfido, or Sumsub. A basic integration involves capturing user data via your frontend, sending it to the provider's API for document and biometric verification, and receiving a risk score. Here is a simplified Node.js example for initiating a check:

javascript
const kycResult = await kycProvider.verifyCustomer({
  customerId: 'user_123',
  documentType: 'PASSPORT',
  documentImage: base64ImageData,
  livePhoto: base64SelfieData
});
if (kycResult.riskScore > 70) {
  triggerEnhancedDueDiligence(customerId);
}

Your internal systems must securely link this verified identity to the customer's blockchain addresses.

Finally, all CDD information, risk assessments, and supporting documentation must be meticulously record-kept for a minimum period, typically five to seven years after the account closure, as per local regulations. This audit trail is critical for regulatory examinations and law enforcement inquiries. A well-designed CDD program balances regulatory compliance, security, and user experience, forming the essential first layer of defense against illicit finance in your custodial platform.

compliance-tools-resources
DESIGNING AN AML/CFT PROGRAM

Essential Compliance Tools and APIs

A robust compliance program requires integrating specialized tools for transaction monitoring, identity verification, and regulatory reporting. This guide covers the core technical components and APIs needed to build a compliant virtual asset custodian.

05

Risk Assessment & Policy Engines

A formal, documented Risk Assessment is the foundation of any AML/CFT program. Technical policy engines help codify and enforce these assessments.

  • Jurisdictional Risk: Automatically applying enhanced due diligence (EDD) for users from high-risk countries.
  • Product/Service Risk: Setting different monitoring rules for custodial staking, OTC desks, or institutional services versus retail wallets.
  • Dynamic Rule Engine: Allows compliance officers to create, test, and deploy new monitoring rules without engineering support, using a visual interface or YAML/JSON configuration. Tools like ComplyAdvantage or native rule engines in TMS platforms facilitate this.
transaction-monitoring
OPERATIONAL FRAMEWORK

Step 3: Designing Transaction Monitoring Rules

Transaction monitoring rules are the automated logic that screens for suspicious activity, forming the core of your AML/CFT program's detection capabilities.

Effective transaction monitoring rules are built on risk-based parameters derived from your risk assessment. These rules analyze transaction data against predefined thresholds and patterns to flag anomalies. Key data points include transaction amount, frequency, origin, destination (especially high-risk jurisdictions), and counterparty wallet addresses. For a custodian, rules must be tailored to the specific risks of holding assets on behalf of clients, such as monitoring for unauthorized withdrawal patterns or commingling of funds.

Rules typically fall into several categories. Volume/velocity rules flag transactions exceeding a set amount (threshold_amount) or frequency (tx_count) within a time window (time_window_hours). Behavioral rules detect deviations from a client's established historical pattern. Counterparty risk rules screen transactions involving addresses on sanctions lists (OFAC SDN), known scam contracts, or mixing services. A rule logic snippet might check: IF (tx_value > risk_tier_limit AND destination_country IN high_risk_list) THEN flag_for_review.

Implementing these rules requires integrating with your custody platform's data pipeline. You'll need to access transaction logs, wallet address labels, and customer due diligence (CDD) data. Rules should be coded into a monitoring engine, which could be a commercial solution like Chainalysis KYT or an internally built system querying an indexed blockchain dataset. Each flagged alert must generate a suspicious activity report (SAR) workflow for analyst review, documenting the rule triggered and the associated evidence.

Continuous tuning is critical to avoid alert fatigue. Start with conservative thresholds and refine them based on false positive rate analysis. If 95% of alerts from a "Large Withdrawal" rule are false positives, adjust the amount threshold or add a whitelist for pre-approved institutional transfers. Regularly update rules to address new typologies, such as pig butchering scams or exploits involving specific DeFi protocols. Your rule set is a living document that must evolve with the threat landscape and regulatory guidance from bodies like the Financial Action Task Force (FATF).

ALERT TRIGGERS

Common Transaction Monitoring Alert Scenarios

Key transaction patterns that should generate alerts for review by a Virtual Asset Custodian's compliance team.

Alert ScenarioTypical Threshold / PatternPrimary RiskRecommended Action

Structuring / Smurfing

Multiple deposits/withdrawals just below the $3,000 reporting threshold within 24 hours

Money Laundering

Freeze assets, file SAR/STR

Rapid Round-Trip Transactions

Large deposit and withdrawal to/from same external wallet within 1 hour

Layering, Fraud

Investigate source/destination, consider temporary hold

High-Risk Jurisdiction Exposure

Transaction with VASP or wallet in FATF black/grey-listed country

Sanctions Evasion, ML/TF

Enhanced Due Diligence, possible block

Unusual Behavioral Spike

Transaction volume or frequency >200% of customer's 90-day average

Account Takeover, ML

Contact customer for verification, review login logs

Mixing Service Interaction

Direct deposit from or withdrawal to known mixer/tumbler address (e.g., Tornado Cash)

Obfuscation, ML

Immediate block, mandatory SAR/STR filing

PEP or Sanctioned Entity Match

Transaction counterparty matches name/address on internal PEPs or sanctions list

Sanctions Violation, Reputational Risk

Block transaction, escalate to Chief Compliance Officer

Mule Account Pattern

New account receives funds from multiple unrelated parties and immediately withdraws to a single external wallet

Fraud, Money Mule

Freeze account, file SAR/STR, consider law enforcement referral

travel-rule-integration
COMPLIANCE IMPLEMENTATION

Step 4: Integrating the FATF Travel Rule (Rule 16)

This section details the technical and procedural requirements for implementing the FATF's Travel Rule (Recommendation 16) within a virtual asset custodian's AML/CFT program.

The FATF Travel Rule (Recommendation 16) mandates that Virtual Asset Service Providers (VASPs) like custodians must collect and transmit beneficiary and originator information for virtual asset transfers exceeding a designated threshold (USD/EUR 1,000). For custodians, this applies to both inbound transfers (where you are the beneficiary VASP) and outbound transfers (where you are the originator VASP). The rule's core objective is to create an audit trail for virtual asset transactions, mirroring the requirements of the traditional financial system's wire transfer rules. Failure to comply can result in significant regulatory penalties and reputational damage.

Implementing the Travel Rule requires integrating several key components into your platform's transaction flow. First, you must establish a secure and standardized communication channel with other VASPs. The industry has largely coalesced around the InterVASP Messaging Standard (IVMS101) for data formatting and protocols like the Travel Rule Universal Solution Technology (TRUST) or proprietary APIs for secure data exchange. Your system must be able to parse incoming IVMS101 data packets and generate compliant packets for outgoing transfers. This involves mapping transaction details to specific IVMS101 data fields such as originator name, originatorAccountNumber (the blockchain address), and beneficiary details.

A critical technical challenge is validating the counterparty VASP. Before transmitting sensitive customer data, you must verify that the receiving entity is a legitimate, regulated VASP. This is typically done by checking against a VASP directory or using a Decentralized Identifier (DID) system. Solutions like the Travel Rule Information Sharing Alliance (TRISA) or Sygna Bridge provide frameworks for this verification. Your compliance workflow should automatically halt transfers if the beneficiary VASP cannot be verified, triggering a manual review. This step is essential for preventing data leakage to unregulated or illicit actors.

For outbound transfers, your system must automatically attach the required originator information to the transaction. In practice, this rarely means storing data directly on-chain due to privacy concerns. Instead, the IVMS101 data packet is transmitted securely to the beneficiary VASP off-chain, while the on-chain transaction proceeds normally. The two are linked via a unique transaction identifier. Your user interface must clearly inform customers that their identifying information will be shared with the receiving VASP, as required by privacy regulations like GDPR. You must also have procedures to screen the provided beneficiary details against sanctions lists before allowing the transfer to be initiated.

For inbound transfers, you must have automated processes to request missing information from the originator VASP if a transaction arrives without compliant Travel Rule data. Your system should be able to receive, validate, and securely store the incoming IVMS101 data, linking it to the corresponding on-chain transaction in your ledger. This data must be retained for the duration mandated by your jurisdiction's record-keeping laws (often 5+ years) and be readily available for audit or law enforcement requests. Implementing robust data encryption at rest and in transit is non-negotiable for protecting this sensitive personal information.

Finally, continuous monitoring is key. Your program should include periodic testing of the Travel Rule integration, reviewing failed transmissions, and updating VASP verification lists. As the regulatory and technical landscape evolves—with developments in decentralized identity and new protocol standards—your implementation will require ongoing maintenance. Documenting all procedures, data flows, and partner integrations is crucial for demonstrating compliance during an examination by regulators like FinCEN in the US or the FCA in the UK.

reporting-recordkeeping
AML/CFT PROGRAM DESIGN

Step 5: Reporting and Record-Keeping Systems

This step details the operational backbone of your compliance program: the systems for documenting transactions, generating reports, and maintaining records for regulatory audits.

A robust reporting and record-keeping system is the foundation for regulatory examination and internal oversight. For a virtual asset custodian, this extends beyond traditional finance to include on-chain data. Your system must capture and retain all customer identification information, transaction logs, internal risk assessments, and Suspicious Activity Report (SAR) filings. Records must be kept for a minimum of five years, as mandated by the Bank Secrecy Act (BSA) and FinCEN guidance for Virtual Asset Service Providers (VASPs). This includes the complete transaction hash, wallet addresses, amounts, timestamps, and any internal case notes.

Automation is critical for scalability and accuracy. Integrate your custodial wallet infrastructure with a compliance data pipeline. This pipeline should automatically ingest blockchain transaction data from your nodes or indexers, correlate it with your internal customer database using the wallet_address as a key, and flag transactions against your risk rules. Tools like Chainalysis Reactor or Elliptic can be integrated via API to enrich transaction data with entity clustering and risk scoring, which should be stored alongside the raw transaction record. Manual processes for data collection are prone to error and cannot scale.

Your system must facilitate specific regulatory reports. The primary report is the Suspicious Activity Report (SAR), filed with FinCEN via the BSA E-Filing System. Your platform should have a workflow to draft, review, and submit SARs, retaining a copy. For transactions over $10,000, you may need to file a Currency Transaction Report (CTR). Furthermore, you must be prepared to respond to 314(a) Information Requests from law enforcement, which requires the ability to quickly query your records for specific customers or wallets. Implement role-based access controls to ensure only authorized compliance personnel can generate and submit these reports.

Record-keeping also encompasses internal reporting for governance. The Chief Compliance Officer (CCO) should receive regular dashboards showing key metrics: volume of transactions screened, number of alerts generated and their resolution rate, SARs filed, and updates to customer risk ratings. This data, often visualized in tools like Tableau or Looker, is essential for reporting to the Board of Directors and proving the program's ongoing effectiveness. These internal reports are themselves compliance records that may be reviewed by examiners.

Finally, ensure your systems are audit-ready. This means data must be immutable, time-stamped, and easily retrievable. Consider using a dedicated, secure database (e.g., a fortified PostgreSQL instance with audit logging enabled) for compliance data, separate from your core application database. Regularly test your data retrieval processes. During an exam, regulators will request specific data sets; the ability to produce comprehensive, organized records promptly demonstrates operational maturity and reduces examination friction.

DEVELOPER IMPLEMENTATION

Frequently Asked Questions (FAQ)

Common technical and operational questions for developers building AML/CFT compliance systems for virtual asset custodians.

A compliant program is built on four interconnected technical systems:

  • Transaction Monitoring System (TMS): A rules engine that screens all on-chain and off-chain transactions against predefined risk scenarios (e.g., structuring, mixing services, sanctioned addresses). It should integrate with blockchain analytics providers like Chainalysis or TRM Labs via API.
  • Customer Due Diligence (CDD) & KYC Engine: An identity verification pipeline that collects, verifies (using providers like Jumio or Onfido), and risk-scores customer data. This system must create a persistent customer risk profile.
  • Sanctions Screening Filter: A real-time API-based service (e.g., from Elliptic or ComplyAdvantage) that screens customer wallets and transaction counterparties against global sanctions lists (OFAC, UN) and Politically Exposed Persons (PEP) databases.
  • Suspicious Activity Report (SAR) Generation Module: A secure workflow tool that allows compliance officers to document, investigate, and file reports to Financial Intelligence Units (FIUs). This must ensure data integrity and audit trails.

These systems must share data via a centralized risk database to create a holistic view of customer behavior.

How to Design an AML/CFT Program for a Virtual Asset Custodian | ChainScore Guides