Table of Contents
- Overview: What a Compliance Program Must Include
- Step 1: Regulatory Mapping
- Step 2: Enterprise Risk Assessment
- Step 3: Appoint a Qualified Compliance Officer
- Step 4: Write Policies and Procedures
- Step 5: Implement KYC/CDD Procedures
- Step 6: Deploy Transaction Monitoring
- Step 7: Implement Sanctions Screening
- Step 8: Build SAR/STR Filing Capability
- Step 9: Implement Travel Rule Compliance
- Step 10: Deploy Compliance Technology Stack
- Step 11: Establish Training Program
- Step 12: Prepare for Independent Testing
- Step 13: Board and Senior Management Reporting
- Step 14: Ongoing Program Maintenance
- Timeline and Budget
- Common Mistakes to Avoid
Overview: What a Compliance Program Must Include
Every regulatory framework requires digital asset businesses to maintain an AML/CFT compliance program. While specific requirements vary by jurisdiction, the core components are consistent. A compliant program must include written policies and procedures, a designated compliance officer with appropriate authority and resources, a risk assessment framework, customer due diligence procedures, transaction monitoring systems, sanctions screening, suspicious activity reporting, Travel Rule compliance, a training program, and independent testing.
This guide walks through each component with specific, actionable implementation steps. It is designed for compliance officers building a program from scratch, but the framework applies equally to firms upgrading an existing program to meet enhanced regulatory requirements.
The implementation timeline ranges from 3-6 months for a baseline program to 12+ months for a fully mature program with optimized technology and processes. The budget ranges from $300,000 for a small startup to $5 million+ for a mid-size exchange. These are significant investments, but they are a fraction of the cost of non-compliance — enforcement penalties, license revocation, and reputational damage.
Step 1: Regulatory Mapping
Objective: Identify every regulation that applies to your business.
Actions:
- List every jurisdiction where your firm is incorporated, operates, serves customers, or has a regulatory nexus
- For each jurisdiction, identify the specific licensing or registration requirements that apply to your business model
- Map the AML/CFT requirements in each jurisdiction (CDD standards, transaction monitoring requirements, reporting obligations, record-keeping requirements)
- Identify securities regulation requirements if you deal in tokens that may be securities
- Identify tax reporting obligations in each jurisdiction
- Document the regulatory map in a matrix format showing: jurisdiction, applicable law/regulation, licensing status, specific compliance requirements, and compliance owner
Deliverable: Regulatory compliance matrix covering all jurisdictions and all applicable requirements.
Common Pitfall: Focusing only on your primary jurisdiction. If you serve customers in 50 countries, you may have compliance obligations in many of them, even if you are only licensed in one. The regulatory mapping must cover all jurisdictions where you have customers or counterparties.
Step 2: Enterprise Risk Assessment
Objective: Identify, assess, and document your firm’s ML/TF risks.
Actions:
- Assemble the risk assessment team (CCO, senior compliance analysts, legal counsel, business unit heads)
- Gather data: customer demographics, transaction data, product/service inventory, geographic distribution
- Assess customer risk factors (jurisdiction, type, PEP status, industry sector)
- Assess product/service risk factors (exchange, custody, lending, transfer services)
- Assess geographic risk factors (using FATF evaluations, Basel AML Index, sanctions lists)
- Assess delivery channel risk factors (remote onboarding, API access, mobile)
- Assess crypto-specific risk factors (privacy coins, mixer exposure, DeFi interaction, self-hosted wallets)
- Score each risk factor using a consistent methodology
- Identify mitigating controls and assess their effectiveness
- Calculate residual risk for each factor
- Document the complete assessment with supporting rationale
- Obtain senior management and board approval
Deliverable: Written enterprise-wide risk assessment document.
For detailed risk assessment methodology, see Crypto AML Compliance Risk Assessment.
Step 3: Appoint a Qualified Compliance Officer
Objective: Designate a compliance officer with the authority, independence, and expertise to manage the program.
Actions:
- Define the compliance officer role with clear authority and reporting lines. The CCO should report directly to the CEO or the board — not to a business unit head whose interests may conflict with compliance
- Ensure the CCO has the authority to approve or reject customer onboarding, escalate suspicious activity without business interference, access all customer and transaction data, and recommend policy changes to senior management
- Hire or designate a qualified individual with AML/CFT compliance experience in financial services (digital asset experience strongly preferred), professional certifications (CAMS, CFCS), understanding of blockchain technology and digital asset operations, and knowledge of applicable regulatory frameworks
- Ensure adequate budget and staffing. The CCO must have sufficient resources — both staff and technology — to manage the program effectively
- Register the CCO with applicable regulators where required (VARA, MAS, etc.)
Deliverable: Appointed CCO with documented authority, reporting lines, and resources.
Step 4: Write Policies and Procedures
Objective: Document the policies and procedures that implement your compliance program.
Actions:
Draft the following core policy documents:
- AML/CFT Policy — The overarching policy statement committing the firm to AML compliance, defining the compliance function’s authority, and establishing the risk-based approach
- KYC/CDD Procedures — Detailed procedures for customer identification, verification, risk assessment, and ongoing monitoring
- Enhanced Due Diligence Procedures — Specific procedures for high-risk customers, PEPs, and high-risk jurisdictions
- Transaction Monitoring Procedures — Rules, thresholds, alert review procedures, and escalation processes
- Sanctions Screening Procedures — Screening methodology, list management, and blocked transaction handling
- SAR/STR Filing Procedures — Investigation procedures, filing criteria, narrative standards, and quality control
- Travel Rule Procedures — Data collection, transmission, and verification procedures
- Record Retention Policy — What records to retain, retention periods, and storage requirements
- Training Policy — Training requirements, frequency, and documentation
- Compliance Testing Policy — Independent testing requirements and scope
Ensure policies are specific to your business, not generic templates. Regulators consistently cite generic, template-based policies as a deficiency
Include clear escalation procedures and decision-making authority at each level
Establish a policy review cycle (at least annual) and a process for updating policies when regulations change
Obtain senior management approval for all policies
Deliverable: Complete policy and procedure manual.
Step 5: Implement KYC/CDD Procedures
Objective: Build the customer onboarding and verification process.
Actions:
- Select and integrate an identity verification platform (Sumsub, Jumio, Onfido, or equivalent). See Sumsub vs. Jumio KYC Platforms
- Configure verification workflows for individual and entity customers
- Implement tiered verification levels corresponding to risk-based CDD:
- Simplified CDD — For low-risk customers with limited activity (where permitted by jurisdiction)
- Standard CDD — Government ID verification, address verification, PEP/sanctions screening
- Enhanced CDD — Source of funds documentation, enhanced identity verification, senior management approval
- Build the entity onboarding workflow including beneficial ownership identification and verification
- Implement ongoing CDD processes including periodic customer review, re-verification, and risk score updates
- Configure PEP screening using automated databases
- Set up adverse media monitoring
- Test the complete onboarding workflow end-to-end before launch
Deliverable: Operational KYC/CDD system with documented procedures.
Step 6: Deploy Transaction Monitoring
Objective: Implement real-time and batch transaction monitoring to detect suspicious activity.
Actions:
- Select and integrate a blockchain analytics platform (Chainalysis, TRM Labs, or Elliptic). See Chainalysis vs. Elliptic vs. TRM Labs
- Configure monitoring rules based on your risk assessment findings. Start with baseline rules:
- Transactions involving sanctioned addresses or entities
- Transactions with direct exposure to darknet markets, mixers, or other high-risk services
- Transactions above defined value thresholds
- Rapid sequences of transactions (velocity rules)
- Transactions just below reporting thresholds (structuring patterns)
- Transactions involving high-risk jurisdictions
- Establish alert review procedures:
- Define SLA for alert review (e.g., high-priority within 4 hours, standard within 24 hours)
- Create investigation templates and documentation standards
- Define escalation criteria (when does an alert become a case? when does a case become a SAR?)
- Assign analyst responsibilities and workload expectations
- Implement case management (either built into the analytics platform or as a separate system)
- Plan for ongoing rule tuning based on operational experience — expect high false positive rates initially
Deliverable: Operational transaction monitoring system with configured rules and alert review procedures.
Step 7: Implement Sanctions Screening
Objective: Screen all customers, counterparties, and transactions against applicable sanctions lists.
Actions:
- Identify all applicable sanctions lists (OFAC SDN, EU consolidated, UN, local lists)
- Implement name-based screening with fuzzy matching for all customer names and beneficial owners
- Implement address-based screening for all blockchain addresses against OFAC-published cryptocurrency addresses
- Configure real-time screening for all transactions
- Establish procedures for potential matches: investigation process, escalation to compliance officer, and blocking/rejecting procedures
- Implement a process for reviewing sanctions list updates (OFAC updates occur frequently)
- Document the sanctions compliance program
Deliverable: Operational sanctions screening system.
Step 8: Build SAR/STR Filing Capability
Objective: Establish the process for investigating and reporting suspicious activity.
Actions:
- Define SAR/STR filing criteria aligned with applicable regulatory requirements
- Establish the investigation workflow:
- Alert/case identified for potential SAR
- Investigator gathers relevant information (transaction data, blockchain analytics, customer profile, prior filings)
- Investigator drafts SAR narrative following the who/what/when/where/why framework
- Quality review by senior analyst or compliance officer
- CCO approval and filing
- Register with FinCEN’s BSA E-Filing system (for US-regulated entities) and equivalent systems in other jurisdictions
- Implement SAR filing tracking and record keeping
- Establish 90-day continuing review procedures for filed SARs
- Ensure confidentiality protections — SAR existence and content must not be disclosed to the subject of the SAR
Deliverable: SAR/STR filing procedures and systems.
Step 9: Implement Travel Rule Compliance
Objective: Exchange originator and beneficiary information for qualifying transfers.
Actions:
- Identify applicable Travel Rule thresholds in each jurisdiction (e.g., $3,000 US, EUR 1,000 EU, SGD 1,500 Singapore)
- Select and integrate a Travel Rule compliance platform (Notabene or equivalent)
- Implement counterparty VASP identification for incoming and outgoing transfers
- Build data collection workflows to capture required originator/beneficiary information from customers
- Configure the data exchange process with counterparty VASPs
- Establish procedures for transfers involving unhosted wallets (self-hosted wallet verification)
- Implement record keeping for all Travel Rule data exchanges
Deliverable: Operational Travel Rule compliance system.
Step 10: Deploy Compliance Technology Stack
Objective: Ensure all compliance technology components are integrated and operational.
Actions:
- Verify that all compliance technology components are deployed and integrated:
- KYC/identity verification platform
- Blockchain analytics/transaction monitoring
- Sanctions screening
- Travel Rule compliance
- Case management
- Regulatory reporting tools
- Test all integration points to ensure data flows correctly between systems
- Verify that alert generation, case creation, and escalation workflows operate correctly
- Implement monitoring and alerting for compliance system availability — compliance systems must operate continuously
- Document the technology architecture and data flows
For detailed technology guidance, see Compliance Technology Infrastructure.
Deliverable: Fully integrated and tested compliance technology stack.
Step 11: Establish Training Program
Objective: Train all employees on their compliance responsibilities.
Actions:
- Develop role-specific training curricula:
- All employees: General AML awareness, red flags, escalation procedures, sanctions compliance basics
- Customer-facing staff: KYC procedures, suspicious activity indicators, customer communication
- Compliance analysts: Transaction monitoring, investigation techniques, SAR preparation, blockchain analytics
- Senior management: Compliance program oversight, regulatory obligations, enforcement risk
- Schedule initial training for all current employees
- Incorporate compliance training into the onboarding process for new hires
- Establish an annual refresher training cycle
- Document all training delivery including attendees, topics covered, and completion dates
- Consider professional certification for compliance staff (CAMS, CFCS)
Deliverable: Documented training program with completed initial training.
Step 12: Prepare for Independent Testing
Objective: Engage independent third parties to test the compliance program.
Actions:
- Select an independent testing firm (external audit firm, compliance consulting firm, or law firm with AML expertise)
- Define the testing scope covering all major compliance functions
- Schedule the first independent test within 12 months of program launch
- Establish an annual testing cycle
- Create a process for tracking and remediating testing findings
Deliverable: Engaged independent testing provider with defined scope and schedule.
Step 13: Board and Senior Management Reporting
Objective: Establish regular compliance reporting to the board and senior management.
Actions:
- Define compliance KPIs and metrics:
- Alert volumes and disposition rates
- SAR filing volumes
- Customer risk distribution
- Sanctions screening results
- Training completion rates
- Regulatory examination results
- Compliance program budget vs. actual
- Establish a quarterly compliance report for the board
- Implement real-time escalation procedures for material compliance issues
- Document board oversight activities (meeting minutes, resolutions, directives)
Deliverable: Board reporting framework and first quarterly report.
Step 14: Ongoing Program Maintenance
Objective: Keep the compliance program current and effective.
Actions:
- Monitor regulatory developments in all applicable jurisdictions
- Update risk assessment at least annually
- Review and update policies and procedures at least annually
- Tune transaction monitoring rules based on operational data
- Track enforcement actions in the industry for compliance lessons
- Maintain relationships with regulators and participate in industry working groups
- Conduct periodic compliance program self-assessments between independent tests
Deliverable: Ongoing maintenance calendar and regulatory monitoring process.
Timeline and Budget
Implementation Timeline
| Phase | Duration | Key Activities |
|---|---|---|
| Foundation | Month 1-2 | Regulatory mapping, risk assessment, CCO appointment |
| Policies | Month 2-3 | Policy drafting, senior management approval |
| Technology | Month 3-5 | KYC, monitoring, screening, Travel Rule deployment |
| Operations | Month 5-6 | Alert review procedures, SAR capability, training |
| Testing | Month 9-12 | Independent testing, remediation |
| Optimization | Ongoing | Rule tuning, program enhancement |
Budget Estimates
| Component | Startup/Small | Mid-Size Exchange | Large Exchange |
|---|---|---|---|
| CCO Compensation | $150-250K | $250-400K | $350-500K |
| Compliance Staff | $100-300K | $300-1M | $1-5M |
| Technology | $100-300K | $300-1.5M | $1.5-7M |
| Legal/External | $50-150K | $150-500K | $500K-2M |
| Training | $10-30K | $30-100K | $100-300K |
| Independent Testing | $25-50K | $50-150K | $150-500K |
| Annual Total | $435K-1.08M | $1.08M-3.65M | $3.6M-15.3M |
Common Mistakes to Avoid
- Starting with technology before strategy. Technology is a tool, not a strategy. Build the program design first, then select technology to implement it.
- Using template policies. Generic policy templates do not satisfy regulatory requirements. Policies must be specific to your business, risk profile, and operating model.
- Underfunding the compliance function. Compliance is not a department to minimize — it is the function that keeps you in business. Budget accordingly.
- Treating compliance as a one-time project. Compliance is an ongoing operational function that requires continuous investment, maintenance, and improvement.
- Ignoring the risk assessment. The risk assessment is not a checkbox — it is the foundation that drives every other element of the program. Invest the time to do it right.
- Failing to document. If it is not documented, it did not happen. Regulators evaluate compliance programs based on documentation, not verbal assurances.
- Not tuning monitoring rules. Default monitoring rules will produce unmanageable false positive rates. Plan for ongoing rule tuning and optimization.
- Neglecting training. Every employee is a compliance risk. Comprehensive, role-specific training is not optional.
For the complete pillar guide covering all compliance domains, see Crypto Compliance Definitive Guide. Updated March 2026.