Crypto License in Portugal

VASP Registration and MiCA CASP Authorisation — Regulated EU Market Entry

A crypto licence in Portugal is not a registration formality. It is a regulatory market-entry project that determines whether your business can operate under supervision today and transition into MiCA authorisation tomorrow without rebuilding its core structure.

We provide end-to-end crypto licensing and MiCA transition services in Portugal for exchanges, custodians, broker-style platforms, and trading venue operators. The engagement covers the current Banco de Portugal VASP registration layer and the design of a MiCA-ready CASP operating model aligned with prudential, governance, consumer-protection, and operational-resilience standards expected under EU supervision.

This is not a document-only service. We build a regulator-defensible operating system: governance authority, AML execution and evidence discipline, KYC and EDD logic, transaction monitoring and SAR decision-making, record retention and reconstruction capability, outsourcing control, custody and key-management governance, and ICT resilience aligned with DORA-level expectations.

The result is a Portugal-based crypto business that can operate legally, maintain banking relationships, withstand inspections, and move into MiCA authorisation with structural continuity. If your objective is long-term EU market access rather than temporary registration, this page defines the standard and delivery model required.


Who This Service Is For

This service is designed for operators who require a credible EU base and a realistic MiCA transition path.

Typical client profiles include:

  • crypto exchanges offering fiat-to-crypto and crypto-to-crypto services

  • custodial wallet and custody providers holding client assets or keys

  • broker and execution platforms acting on behalf of clients

  • trading venue operators preparing for MiCA trading-platform scope

  • international groups establishing regulated EU substance in Portugal


What You Achieve

Commercial outcomes of a correctly built Portugal structure:

  • lawful operation under the current VASP regime

  • a MiCA-ready CASP architecture aligned with EU supervision

  • governance and control functions that survive inspections

  • AML and Travel Rule execution that is defensible in practice

  • custody and asset-segregation logic acceptable to banks and partners

  • a structure that scales without regulatory rework


Regulatory Framework in Portugal

VASP Registration — AML Layer

Portugal’s current crypto regime is based on VASP registration under national AML/CFT law. Supervision focuses exclusively on financial-crime prevention and integrity of controls.

Activities typically covered include:

  • exchange between virtual assets and fiat currencies

  • exchange between virtual assets

  • transfer of virtual assets

  • custody and administration of virtual assets and private keys

Approval depends on the quality of AML execution, personnel competence, and local substance — not on formal filings alone.


MiCA CASP Authorisation — Institutional Layer

MiCA transforms the Portuguese crypto framework from AML registration into full financial supervision with EU passporting rights.

MiCA authorisation requires:

  • defined service scope selection

  • prudential safeguards and capital planning

  • governance and fit-and-proper management

  • consumer-protection and conduct controls

  • ICT risk management and operational resilience

The MiCA layer does not replace AML supervision. It adds institutional obligations on top of it.


Deliverables

Regulatory Architecture Pack

  • service-perimeter classification and licensing strategy

  • VASP registration roadmap

  • MiCA CASP scope selection and transition plan

  • substance and governance model aligned with EU supervision

AML and Financial Crime Pack

  • enterprise-wide risk assessment

  • AML/CFT internal procedures with executable workflows

  • KYC, CDD, and EDD logic and escalation thresholds

  • transaction-monitoring design and investigation framework

  • SAR decision governance and record-retention structure

Governance and Control Functions Pack

  • management-body structure and accountability mapping

  • compliance function design (MiCA-ready)

  • risk-management function architecture

  • internal review and control-testing framework

  • conflict-of-interest identification and mitigation controls

Technology, Custody, and Resilience Pack

  • custody and asset-segregation model

  • key-management governance and access controls

  • change-management and incident-response procedures

  • outsourcing and third-party risk framework

  • readiness for independent security testing

Submission and Supervisory Readiness Pack

  • application assembly and consistency checks

  • regulator Q&A and evidence-tracking workflow

  • audit-ready documentation binder structure

  • post-approval supervisory interaction model


Process

Scoping and Perimeter Definition

We map your real activities to the Portuguese VASP regime and MiCA CASP categories, eliminating ambiguity and misclassification risk.

Operating Model Build

We design the compliance and governance system that will be tested in practice — not just reviewed on paper.

Documentation and Evidence Assembly

We package the operating system into regulator-ready documentation with internal consistency and audit traceability.

Filing and Regulatory Interaction

We manage submission, clarification rounds, and information requests while maintaining a coherent regulatory narrative.

MiCA Transition Execution

We convert registration into a controlled MiCA transition without disrupting live operations.


AML Execution in Practice

AML credibility in Portugal is measured through behaviour, not manuals.

A defensible AML model includes:

  • risk-based client segmentation

  • consistent application of EDD

  • calibrated monitoring thresholds

  • investigation narratives with reasoning

  • SAR decisions that are consistent and traceable

Inability to reconstruct past decisions is treated as a governance failure.


Travel Rule and Transaction Integrity

Travel Rule compliance must be embedded into transaction flows.

Expected controls include:

  • originator and beneficiary data capture

  • secure data transmission and storage

  • exception handling for incomplete data

  • enhanced scrutiny for unhosted wallets

  • reconciliation between blockchain and internal records

Manual or ad-hoc handling collapses at scale.


Custody and Asset Protection

Custody services attract the highest scrutiny.

Institutional-grade custody requires:

  • legal and operational segregation of client assets

  • wallet architecture with reconciliation discipline

  • quorum-based access controls

  • documented loss and recovery scenarios

  • client-communication rules for incidents

Single-person control or undocumented movements are unacceptable.


Governance and Fit-and-Proper Reality

Management credibility is a decisive factor.

Supervisory expectations include:

  • demonstrable competence aligned with services

  • real decision-making authority in Portugal

  • independence of control functions

  • documented challenge and oversight

Nominal appointments undermine licence stability.


Technology and Operational Resilience

Operational resilience is evaluated continuously.

A MiCA-ready structure includes:

  • ICT risk-management framework

  • incident-response authority and escalation paths

  • vulnerability testing and remediation discipline

  • change-management governance

  • third-party dependency control

Resilience is judged by repeatability, not declarations.


Banking and Counterparty Acceptance

Banks and payment institutions act as secondary supervisors.

They typically assess:

  • ownership transparency

  • AML execution quality

  • custody and segregation logic

  • incident-response readiness

  • regulatory-transition planning

A weak operating model loses bankability quickly.


Scaling Without Regulatory Drift

Growth is a supervisory test.

A stable scaling model links:

  • transaction volume to AML capacity

  • client growth to onboarding resources

  • custody exposure to operational oversight

  • new products to formal approval processes

Uncontrolled growth is treated as structural risk.


Long-Term Obligations After Authorisation

Operating a licensed crypto business in Portugal requires:

  • continuous regulatory reporting

  • maintenance of capital and safeguards

  • periodic audits and control testing

  • notification of material changes

  • alignment with evolving EU rules

Authorisation is the start of responsibility, not the end.


Why Portugal as an EU Base

Portugal works when approached as an institutional EU base, not as a shortcut.

Correctly built, it offers:

  • regulatory credibility

  • EU passporting under MiCA

  • predictable supervisory logic

  • strong talent and infrastructure access

  • long-term stability for regulated crypto operations

Request a Crypto Licensing Assessment

Supervisory Reality and Post-Authorisation Operation in Portugal

How a Portuguese Crypto Business Is Actually Tested After Approval

Obtaining a crypto licence in Portugal is not the end of regulatory scrutiny. It is the beginning of a continuous supervisory relationship in which behaviour, not documentation, determines whether the business remains viable. Both AML supervision and MiCA-era prudential oversight are exercised as ongoing control mechanisms, not periodic formalities.

This section explains how supervision is applied in practice once a Portuguese crypto business becomes operational, what regulators, banks, and counterparties actually test over time, and how a structure must be built to remain stable under pressure, growth, and market stress.


Supervision as a Continuous Operating Condition

Portuguese supervision does not operate on a “file once, forget” logic. From the moment activity begins, the firm is assessed as a live financial operator.

Supervisory pressure typically appears through:

  • targeted follow-up requests tied to transaction behaviour

  • deep dives into specific client files or transaction chains

  • consistency checks between declared policies and observed actions

  • scrutiny triggered by market events, incidents, or partner alerts

The core expectation is simple: every significant decision must be explainable, attributable, and reconstructable long after it was made.


Behavioural Consistency as the Primary Test

Why Policies Alone Do Not Protect the Licence

Portuguese supervisors assume that policies can be written quickly. What they test is whether the organisation behaves in accordance with them when incentives, time pressure, or commercial risk intervene.

A defensible operating model shows:

  • the same risk logic applied across onboarding, monitoring, and escalation

  • consistent treatment of similar cases over time

  • no unexplained deviations between comparable client profiles

  • documentation that reflects real decisions, not after-the-fact rationalisation

Inconsistency is treated as a governance weakness, even when individual decisions appear reasonable in isolation.


Decision Ownership and Accountability

Supervisors expect to see who actually decides.

They routinely assess:

  • whether AML and compliance officers have real authority

  • whether management overrides are documented and justified

  • whether exceptions are rare, controlled, and approved

  • whether decision-makers can be identified clearly

Structures where responsibility is diluted across teams, vendors, or group entities are treated as unstable.


AML Supervision After Registration

From Registration to Enforcement Reality

While initial VASP registration focuses on AML readiness, post-registration supervision focuses on AML execution. This is where most operational failures occur.

Supervisory attention concentrates on:

  • how risk assessments are updated as activity evolves

  • how alerts are investigated, not just closed

  • how SAR decisions are made and documented

  • how staff respond to complex or borderline cases

The absence of SARs is not a sign of strength. It is often a trigger for questions.


Alert Handling as a Quality Signal

Alert handling is reviewed as an operational discipline.

A stable model demonstrates:

  • clear investigation steps

  • use of multiple data sources

  • articulated reasoning for conclusions

  • internal review or escalation where appropriate

Closing alerts mechanically or without narrative undermines credibility.


Retention and Reconstruction Capability

Portuguese supervision places strong emphasis on record retention.

A defensible system allows reconstruction of:

  • why a client was accepted

  • how risk was assessed at onboarding

  • how monitoring thresholds evolved

  • how alerts were resolved

  • why SARs were filed or not filed

Inability to reconstruct is treated as a governance failure, not an IT issue.


Travel Rule Execution Under Real Conditions

Travel Rule as a Transaction Process

Travel Rule compliance is evaluated as part of transaction processing, not as a standalone obligation.

Supervisors examine:

  • data completeness and accuracy

  • secure transmission and storage

  • exception handling for counterparties

  • treatment of failed or partial data exchanges

Systems that rely on manual intervention do not scale and are quickly exposed under volume.


Unhosted Wallet Risk Management

Unhosted wallets are not prohibited, but they are scrutinised.

Expected controls include:

  • enhanced due diligence triggers

  • behavioural analysis of wallet activity

  • transaction limits or monitoring intensification

  • management sign-off for elevated risk

Treating unhosted wallets as routine is a common supervisory red flag.


Governance Functioning Under Supervision

Board and Management Involvement

Governance is assessed through behaviour, not structure charts.

Supervisors look for evidence that:

  • the board receives meaningful compliance and risk reporting

  • management discusses incidents and weaknesses openly

  • challenge and dissent are recorded

  • corrective actions are tracked and closed

Boards that only approve strategies without engaging in risk oversight are viewed as weak.


Local Authority and Substance

Portugal requires genuine local control.

Supervisors test:

  • whether key decisions can be made locally

  • whether escalation does not depend on offshore approval

  • whether compliance and risk functions are independent

  • whether local staff have operational authority

Remote-control models are systematically challenged.


Custody and Asset Protection in Practice

Segregation as an Operational Reality

Custody supervision focuses on asset protection behaviour.

A credible model includes:

  • legal segregation of client assets

  • operational segregation in wallets and accounts

  • frequent reconciliation with defined escalation thresholds

  • documented ownership records accessible on demand

Ambiguity around asset ownership is treated as a critical risk.


Key Management Discipline

Key management is examined through access and control.

Supervisors expect:

  • multi-person access controls

  • defined approval workflows

  • secure storage and backup procedures

  • tested recovery processes

Single-person control or undocumented access paths are unacceptable.


Loss and Incident Scenarios

Supervisors expect realistic planning.

A mature model includes:

  • scenarios for operational error

  • scenarios for internal fraud

  • scenarios for protocol failure

  • client communication strategies

Optimistic assumptions undermine trust.


Technology and Operational Resilience

ICT Risk as a Supervisory Topic

Technology is supervised as financial infrastructure.

Regulators assess:

  • ownership of ICT risk

  • incident response authority

  • testing and remediation discipline

  • third-party dependency management

Lack of internal understanding of core systems is viewed negatively.


Incident Response Expectations

When incidents occur, supervisors expect:

  • immediate containment actions

  • accurate impact assessment

  • timely notification

  • structured remediation plans

Delayed or incomplete disclosure materially worsens outcomes.


Change Management Discipline

Every platform change is treated as a potential risk event.

Expected controls include:

  • documented change approval

  • risk assessment before deployment

  • testing and rollback procedures

  • post-implementation review

Silent releases are routinely uncovered during reviews.


Outsourcing and Group Structures

Outsourcing Does Not Transfer Responsibility

Outsourcing critical functions does not reduce supervisory expectations.

Supervisors evaluate:

  • due diligence on providers

  • contractual control and audit rights

  • fallback arrangements

  • ongoing monitoring of performance

Critical functions without contingency plans are flagged.


Intragroup Arrangements

Group structures are scrutinised closely.

A defensible setup includes:

  • arm’s-length service agreements

  • clear accountability lines

  • retention of control by the Portuguese entity

  • independence of control functions

Structures suggesting that Portugal is a front entity are challenged aggressively.


Banking and Payment Partner Scrutiny

Banks as Shadow Supervisors

Banks and payment institutions apply standards similar to regulators.

They typically assess:

  • AML execution capability

  • governance credibility

  • custody and segregation logic

  • incident history

  • MiCA transition readiness

Loss of banking access often occurs before formal regulatory action.


Managing Bank Reviews

Successful firms:

  • maintain regulator-aligned documentation

  • respond quickly and consistently

  • avoid contradictory narratives

  • disclose incidents proactively

Bank trust is cumulative and fragile.


Scaling Under Supervision

Growth as a Risk Event

Rapid growth is not inherently positive.

Supervisors assess:

  • whether controls scale with volume

  • whether staffing grows proportionally

  • whether monitoring thresholds are recalibrated

  • whether governance keeps pace with complexity

Uncontrolled growth is treated as a failure of management.


Product Expansion Governance

Adding products or features requires discipline.

Expected practices include:

  • formal approval processes

  • impact analysis on AML and custody

  • updates to disclosures and procedures

  • post-launch monitoring

Feature creep without approval is a recurring failure pattern.


Inspections, Audits, and Reviews

Types of Reviews You Will Face

Operational firms are reviewed by multiple parties:

  • AML inspections

  • prudential or conduct reviews

  • bank and EMI audits

  • independent IT and security audits

Consistency across all these reviews is critical.


Preparing for MiCA-Era Inspections

MiCA inspections will focus on:

  • governance effectiveness

  • independence of control functions

  • consumer protection mechanisms

  • market integrity controls

  • operational resilience

Preparation must be continuous, not reactive.


Long-Term Cost of Compliance

Predictable Cost vs. Crisis Cost

Compliance costs increase with scale, but predictably when planned.

Key cost drivers include:

  • compliance and risk staffing

  • ICT security and audits

  • insurance and guarantees

  • reporting and governance overhead

Reactive remediation is significantly more expensive than proactive design.


Compliance as Commercial Infrastructure

Well-built compliance delivers commercial advantages:

  • stronger bankability

  • lower counterparty friction

  • smoother MiCA transition

  • reduced enforcement risk

Compliance becomes an asset, not a burden.


Cultural Signals Regulators Notice

Compliance Culture

Culture is inferred from behaviour.

Signals supervisors observe include:

  • willingness to escalate issues

  • absence of blame-shifting

  • clarity of decision ownership

  • respect for control functions

A growth-at-all-costs culture undermines even strong frameworks.


What a Stable Portuguese Crypto Business Looks Like

A sustainable Portugal-based crypto operation typically shows:

  • real operational substance

  • consistent AML and risk behaviour

  • strong governance and decision discipline

  • credible custody and asset protection

  • resilience under incidents and growth

  • readiness for MiCA supervision

This profile is built through operating discipline, not filings.

Strategic Operating Architecture for a Portugal-Based CASP

How a MiCA-Ready Crypto Business Must Be Structured From Day One

A Portuguese crypto licence delivers value only when the business is architected as a coherent institutional system, not as a collection of policies assembled for approval. Regulators, banks, auditors, and counterparties evaluate whether governance, compliance, technology, finance, and decision-making operate as a single organism. Fragmentation is the most common reason licences lose practical value after approval.

This section explains how a Portugal-based CASP must be structurally built, how internal components must interact, and what design choices determine long-term survivability under MiCA supervision.


One Institution, Not Parallel Silos

A compliant CASP cannot operate as disconnected departments.

A viable operating architecture demonstrates:

  • alignment between governance authority and operational execution

  • AML logic that directly influences product and client design

  • custody and treasury controls that are reflected in accounting

  • technology decisions that match regulatory risk tolerance

  • records that trace decisions across functions

Supervisors and banks actively look for contradictions between these layers.


Governance Architecture That Holds Under Pressure

Management Body as a Control Organ

The management body is assessed as an active risk owner.

A stable governance setup shows:

  • collective understanding of crypto-specific risks

  • approval of risk appetite tied to actual limits

  • documented challenge, not unanimous rubber-stamping

  • direct oversight of incidents and remediation

Boards that delegate all responsibility downward lose credibility quickly.


Local Decision Authority

Portugal requires real local control, not symbolic presence.

Effective models ensure:

  • management can halt activity without parent approval

  • compliance can block launches independently

  • budgets for remediation are controlled locally

  • crisis decisions are not delayed by group politics

Any structure where decisive authority sits abroad creates supervisory tension.


Committees That Actually Function

Committees are tested through minutes and outcomes.

Regulators expect to see:

  • risk committees reviewing exposure trends

  • AML committees resolving escalated cases

  • technology or security committees overseeing resilience

Meetings without substance are identified immediately.


Capital Logic and Financial Discipline

Capital as Risk Infrastructure

Capital is evaluated in context, not isolation.

Supervisors assess:

  • relationship between custody exposure and capital

  • liquidity under stress scenarios

  • dependency on group funding

  • sustainability of operating losses

Capital that exists only to satisfy a minimum threshold is treated as weak.


Treasury and Asset Segregation

Financial architecture must be enforceable.

A defensible model includes:

  • legally segregated client accounts

  • operational separation of wallets

  • daily or near-real-time reconciliation

  • escalation thresholds for discrepancies

Unclear asset ownership is one of the fastest routes to enforcement action.


AML Embedded Into Operations

Risk-Based Approach as a Living System

Risk assessment must drive behaviour.

Operational indicators include:

  • differentiated onboarding flows

  • adaptive monitoring thresholds

  • periodic reassessment of client profiles

  • documented rationale for risk decisions

Static risk matrices signal institutional immaturity.


Alert Handling and Escalation

AML quality is measured at the alert level.

Regulators review:

  • investigation depth

  • use of multiple data sources

  • escalation discipline

  • management involvement in sensitive cases

Closing alerts without analysis is a recurring failure pattern.


SAR Governance

SAR decisions must be explainable.

Effective structures show:

  • clear suspicion logic

  • internal approval records

  • consistency across similar cases

  • preserved evidence

Both over-reporting and under-reporting attract scrutiny.


Travel Rule as Infrastructure

Built Into Transaction Flow

Travel Rule compliance must be automated and embedded.

Supervisors examine:

  • data capture at initiation

  • secure transmission mechanisms

  • exception handling logic

  • reconciliation with blockchain data

Manual handling collapses under scale.


Unhosted Wallet Governance

Unhosted wallets are controlled through risk, not prohibition.

Expected measures include:

  • enhanced due diligence triggers

  • transaction caps or intensified monitoring

  • behavioural analytics

  • senior approval for elevated exposure

Treating unhosted wallets as neutral is a regulatory red flag.


Technology Governance Beyond IT

Ownership of ICT Risk

Technology risk must have a named owner.

Supervisors assess:

  • who can shut down systems

  • who approves changes

  • who owns incident response

  • how third-party risk is controlled

Lack of executive-level understanding of systems undermines confidence.


Cybersecurity and Incident Handling

Incident response defines credibility.

Regulators expect:

  • classification of incidents

  • immediate containment authority

  • forensic capability

  • transparent communication

Delayed disclosure magnifies consequences.


Change Management Discipline

Every system change is a risk event.

A resilient model includes:

  • documented approval flows

  • pre-deployment testing

  • rollback capability

  • post-implementation review

Silent releases are routinely discovered.


Custody as a Core Supervisory Focus

Control Over Keys

Custody is assessed through access control.

Supervisors test:

  • quorum requirements

  • separation of duties

  • emergency access rules

  • backup and recovery processes

Single-person key control is unacceptable.


Loss Scenarios and Recovery

Planning must be realistic.

Expectations include:

  • internal fraud scenarios

  • operational error scenarios

  • protocol failure scenarios

  • client communication playbooks

Optimism is not a control.


Staffing and Human Capital

Staffing as a Risk Metric

Headcount is monitored continuously.

Supervisors consider:

  • workload per compliance officer

  • turnover in key roles

  • reliance on contractors

  • training depth

Chronic understaffing signals structural non-compliance.


Institutional Knowledge

Training must be ongoing.

Effective programmes include:

  • onboarding training

  • scenario-based AML drills

  • incident response simulations

  • governance training for executives

Generic e-learning is insufficient.


Outsourcing and Third-Party Risk

Responsibility Cannot Be Outsourced

Outsourcing does not reduce accountability.

Supervisors assess:

  • vendor due diligence

  • contractual control rights

  • audit access

  • contingency planning

Critical services without fallback plans are flagged.


Intragroup Services

Group structures are examined closely.

A defensible setup shows:

  • arm’s-length pricing

  • documented service scope

  • retained control locally

  • independent compliance authority

Front-entity signals are challenged aggressively.


Product Design and Client Protection

Product Governance

Products are treated as compliance topics.

Supervisors review:

  • fee transparency

  • risk disclosures

  • suitability for target users

  • alignment with licence scope

Marketing claims unsupported by controls trigger review.


Complaint Handling as Control Feedback

Complaints are regulatory signals.

Expected practices include:

  • structured intake

  • root-cause analysis

  • escalation of systemic issues

  • documented outcomes

Ignored complaints often escalate into inspections.


Scaling Without Structural Drift

Growth Governance

Growth must be controlled.

Regulators look for:

  • staffing ratios linked to volume

  • recalibration of monitoring systems

  • governance approval for expansion

  • periodic risk reassessment

Unmanaged growth is treated as negligence.


Geographic Expansion

Cross-border activity adds complexity.

Expectations include:

  • jurisdictional risk analysis

  • consistent AML application

  • alignment with licence perimeter

Fragmented expansion undermines supervision.


Internal Assurance and Self-Testing

Independent Review

Self-testing is expected.

A mature model includes:

  • internal audits

  • thematic reviews

  • remediation tracking

  • board oversight

No self-critique implies immaturity.


Learning Behaviour

Regulators value adaptation.

They assess whether:

  • findings lead to change

  • repeat issues disappear

  • root causes are addressed

Recurring minor issues escalate quickly.


Culture as a Supervisory Factor

Compliance Culture

Culture is inferred from behaviour.

Signals include:

  • openness about problems

  • absence of blame-shifting

  • respect for control functions

  • clarity of ownership

A growth-at-all-costs culture erodes trust.


Commercial Meaning of This Architecture

This architecture exists to ensure that the licence retains value.

A well-built Portugal CASP gains:

  • durable bankability

  • predictable supervisory interaction

  • smoother MiCA transition

  • lower enforcement risk

  • higher strategic credibility

Compliance becomes commercial infrastructure, not friction.

FAQ

MiCA supersedes the existing VASP registration regime. If you are already registered with the BdP, you must apply for full MiCA CASP Authorization with the new designated regulator (expected to be CMVM) by the end of the transitional period (December 30, 2025). Failure to obtain CASP Authorization by this date means your company can no longer legally operate in Portugal or the EU. The BdP will continue to supervise the AML aspects of your business.

The minimum initial capital required depends on the scope of services: €50,000 for advisory and order transmission; €125,000 for execution and trading venue operations; and €150,000 for custody/wallet provision and MTF operations. Companies must also maintain continuous own funds equal to the greater of this minimum or 25% of their fixed overheads.

While the Banco de Portugal (BdP) handles the initial VASP registration and remains the AML/CFT supervisor, the final MiCA CASP Authorization is expected to be granted by the Comissão do Mercado de Valores Mobiliários (CMVM), the Portuguese Securities Market Commission. Authorization from the CMVM is what enables the critical EU Passporting right.

For corporations, profits are taxed at the standard corporate rate (21% or 5% in MIBC). For individuals, Portugal introduced a tax regime in 2023. Capital gains on crypto-assets held for more than 365 days remain generally tax-exempt (as long as the activity is not deemed professional), while short-term gains (under 365 days) are taxed at a flat rate of 28%. Income from mining or staking is generally taxed at progressive income rates.

Yes. Establishing a sufficient level of economic substance in Portugal is a strict requirement for both the current VASP registration and the future CASP authorization. This requires: a dedicated physical office lease, at least one locally resident manager/director, and an experienced, locally appointed AML Compliance Officer (MLRO). Generic virtual offices are not accepted by the Banco de Portugal.

The DAC8 Directive (effective January 1, 2026) imposes mandatory, unified reporting obligations on all CASPs operating in the EU. A CASP in Portugal will be required to automatically report transaction data (including customer identification and values) to the Portuguese tax authorities, who will then exchange this information with other EU member states. This makes tax transparency and accurate record-keeping an integral part of regulatory compliance.

The primary hurdles are the high bar for AML/KYC documentation quality set by the BdP, the lengthy regulatory review timeline (often 6-9 months), and the difficulty in securing a corporate bank account until the VASP registration is secured. The need to demonstrate robust IT infrastructure resilience compliant with DORA is another significant technical hurdle.

Crypto-assets that possess characteristics of traditional financial instruments (such as certain tokenized securities or derivatives) are not governed by the MiCA VASP registration. Instead, they fall under the existing MiFID II regime, requiring a separate and more complex license from the CMVM (similar to an Investment Firm license), which has significantly higher capital and organizational requirements than a standard MiCA CASP license.

Get in touch with our experts