- Add Cloud for Sovereignty landing zone architecture and deployment - Implement complete legal document management system - Reorganize documentation with improved navigation - Add infrastructure improvements (Dockerfiles, K8s, monitoring) - Add operational improvements (graceful shutdown, rate limiting, caching) - Create comprehensive project structure documentation - Add Azure deployment automation scripts - Improve repository navigation and organization
4.1 KiB
4.1 KiB
KYC/AML Standard Operating Procedures (SOP)
Version: 1.0
Date: November 10, 2025
Status: Draft
Overview
This document defines the Standard Operating Procedures (SOPs) for Know Your Customer (KYC), Anti-Money Laundering (AML), and sanctions screening for eResidency and eCitizenship applications.
Screening Lists
Sanctions Lists
Primary Sources:
- UN Security Council Sanctions
- EU Sanctions
- OFAC (US Treasury)
- UK HM Treasury
- Other relevant jurisdictions
Update Frequency:
- Daily automated updates
- Manual review for high-priority updates
- Real-time screening for new applications
PEP Lists
Sources:
- World-Check
- Dow Jones Risk & Compliance
- ComplyAdvantage
- Other commercial providers
Categories:
- Heads of State
- Senior government officials
- Senior political party officials
- Senior judicial officials
- Senior military officials
- State-owned enterprise executives
- Close associates and family members
Risk Scoring
Risk Factors
Low Risk:
- Clear identity verification
- No sanctions matches
- No PEP matches
- Low-risk geography
- Established history
Medium Risk:
- Partial identity verification
- Potential PEP match (distant)
- Medium-risk geography
- Limited history
High Risk:
- Failed identity verification
- Sanctions match
- Direct PEP match
- High-risk geography
- Suspicious patterns
Risk Score Calculation
Formula:
Risk Score = (KYC Risk × 0.4) + (Sanctions Risk × 0.4) + (Geographic Risk × 0.2)
Thresholds:
- Auto-approve: < 0.3
- Manual review: 0.3 - 0.8
- Auto-reject: > 0.8
Enhanced Due Diligence (EDD)
Triggers
Automatic EDD:
- PEP match
- High-risk geography
- Risk score > 0.7
- Suspicious patterns
- Large transactions (if applicable)
EDD Requirements
Additional Checks:
- Source of funds verification
- Additional identity documents
- References or attestations
- Background checks
- Enhanced monitoring
EDD Process
- Identify EDD trigger
- Request additional information
- Verify sources
- Conduct enhanced screening
- Risk assessment
- Decision
PEP Handling
PEP Classification
Direct PEP:
- Current or former PEP
- Immediate family member
- Close associate
Indirect PEP:
- Distant relative
- Former associate
- Historical connection
PEP Process
Direct PEP:
- Automatic EDD
- Enhanced screening
- Manual review required
- Risk assessment
- Decision with justification
Indirect PEP:
- Standard EDD
- Risk assessment
- Decision based on risk
Source of Funds
Requirements
If Applicable:
- Fee payments
- Donations
- Service contributions
- Other financial transactions
Verification
Methods:
- Bank statements
- Payment receipts
- Transaction history
- Attestations
- Third-party verification
Audit Trail
Requirements
Documentation:
- All screening results
- Risk assessments
- Decisions and justifications
- EDD materials
- Audit logs
Retention
Periods:
- KYC artifacts: 365 days (regulatory)
- Application metadata: 6 years
- Audit logs: 7 years
- Credential status: Indefinite
Access
Controls:
- Role-based access
- Audit logging
- Data minimization
- Encryption at rest
- Secure transmission
Compliance
Regulatory Requirements
Jurisdictions:
- GDPR (EU)
- CCPA (California)
- Other applicable laws
Reporting
Obligations:
- Suspicious activity reports (if applicable)
- Regulatory reporting
- Internal reporting
- Audit reporting
Testing
Mock Audit
Scope:
- End-to-end process testing
- Risk assessment validation
- EDD trigger testing
- Audit trail verification
- Compliance checks
Success Criteria
Requirements:
- All processes documented
- All decisions justified
- All audit trails complete
- All compliance checks passed
- No critical findings
Revision History
| Version | Date | Author | Changes |
|---|---|---|---|
| 1.0 | 2025-11-10 | CISO | Initial draft |
Approval
CISO: _________________ Date: _________
Chancellor: _________________ Date: _________
External Counsel: _________________ Date: _________