Crypto License in Portugal
VASP Registration and MiCA CASP Authorisation — Regulated EU Market Entry
A crypto licence in Portugal is not a registration formality. It is a regulatory market-entry project that determines whether your business can operate under supervision today and transition into MiCA authorisation tomorrow without rebuilding its core structure.
We provide end-to-end crypto licensing and MiCA transition services in Portugal for exchanges, custodians, broker-style platforms, and trading venue operators. The engagement covers the current Banco de Portugal VASP registration layer and the design of a MiCA-ready CASP operating model aligned with prudential, governance, consumer-protection, and operational-resilience standards expected under EU supervision.
This is not a document-only service. We build a regulator-defensible operating system: governance authority, AML execution and evidence discipline, KYC and EDD logic, transaction monitoring and SAR decision-making, record retention and reconstruction capability, outsourcing control, custody and key-management governance, and ICT resilience aligned with DORA-level expectations.
The result is a Portugal-based crypto business that can operate legally, maintain banking relationships, withstand inspections, and move into MiCA authorisation with structural continuity. If your objective is long-term EU market access rather than temporary registration, this page defines the standard and delivery model required.
Who This Service Is For
This service is designed for operators who require a credible EU base and a realistic MiCA transition path.
Typical client profiles include:
crypto exchanges offering fiat-to-crypto and crypto-to-crypto services
custodial wallet and custody providers holding client assets or keys
broker and execution platforms acting on behalf of clients
trading venue operators preparing for MiCA trading-platform scope
international groups establishing regulated EU substance in Portugal
What You Achieve
Commercial outcomes of a correctly built Portugal structure:
lawful operation under the current VASP regime
a MiCA-ready CASP architecture aligned with EU supervision
governance and control functions that survive inspections
AML and Travel Rule execution that is defensible in practice
custody and asset-segregation logic acceptable to banks and partners
a structure that scales without regulatory rework
Regulatory Framework in Portugal
VASP Registration — AML Layer
Portugal’s current crypto regime is based on VASP registration under national AML/CFT law. Supervision focuses exclusively on financial-crime prevention and integrity of controls.
Activities typically covered include:
exchange between virtual assets and fiat currencies
exchange between virtual assets
transfer of virtual assets
custody and administration of virtual assets and private keys
Approval depends on the quality of AML execution, personnel competence, and local substance — not on formal filings alone.
MiCA CASP Authorisation — Institutional Layer
MiCA transforms the Portuguese crypto framework from AML registration into full financial supervision with EU passporting rights.
MiCA authorisation requires:
defined service scope selection
prudential safeguards and capital planning
governance and fit-and-proper management
consumer-protection and conduct controls
ICT risk management and operational resilience
The MiCA layer does not replace AML supervision. It adds institutional obligations on top of it.
Deliverables
Regulatory Architecture Pack
service-perimeter classification and licensing strategy
VASP registration roadmap
MiCA CASP scope selection and transition plan
substance and governance model aligned with EU supervision
AML and Financial Crime Pack
enterprise-wide risk assessment
AML/CFT internal procedures with executable workflows
KYC, CDD, and EDD logic and escalation thresholds
transaction-monitoring design and investigation framework
SAR decision governance and record-retention structure
Governance and Control Functions Pack
management-body structure and accountability mapping
compliance function design (MiCA-ready)
risk-management function architecture
internal review and control-testing framework
conflict-of-interest identification and mitigation controls
Technology, Custody, and Resilience Pack
custody and asset-segregation model
key-management governance and access controls
change-management and incident-response procedures
outsourcing and third-party risk framework
readiness for independent security testing
Submission and Supervisory Readiness Pack
application assembly and consistency checks
regulator Q&A and evidence-tracking workflow
audit-ready documentation binder structure
post-approval supervisory interaction model
Process
Scoping and Perimeter Definition
We map your real activities to the Portuguese VASP regime and MiCA CASP categories, eliminating ambiguity and misclassification risk.
Operating Model Build
We design the compliance and governance system that will be tested in practice — not just reviewed on paper.
Documentation and Evidence Assembly
We package the operating system into regulator-ready documentation with internal consistency and audit traceability.
Filing and Regulatory Interaction
We manage submission, clarification rounds, and information requests while maintaining a coherent regulatory narrative.
MiCA Transition Execution
We convert registration into a controlled MiCA transition without disrupting live operations.
AML Execution in Practice
AML credibility in Portugal is measured through behaviour, not manuals.
A defensible AML model includes:
risk-based client segmentation
consistent application of EDD
calibrated monitoring thresholds
investigation narratives with reasoning
SAR decisions that are consistent and traceable
Inability to reconstruct past decisions is treated as a governance failure.
Travel Rule and Transaction Integrity
Travel Rule compliance must be embedded into transaction flows.
Expected controls include:
originator and beneficiary data capture
secure data transmission and storage
exception handling for incomplete data
enhanced scrutiny for unhosted wallets
reconciliation between blockchain and internal records
Manual or ad-hoc handling collapses at scale.
Custody and Asset Protection
Custody services attract the highest scrutiny.
Institutional-grade custody requires:
legal and operational segregation of client assets
wallet architecture with reconciliation discipline
quorum-based access controls
documented loss and recovery scenarios
client-communication rules for incidents
Single-person control or undocumented movements are unacceptable.
Governance and Fit-and-Proper Reality
Management credibility is a decisive factor.
Supervisory expectations include:
demonstrable competence aligned with services
real decision-making authority in Portugal
independence of control functions
documented challenge and oversight
Nominal appointments undermine licence stability.
Technology and Operational Resilience
Operational resilience is evaluated continuously.
A MiCA-ready structure includes:
ICT risk-management framework
incident-response authority and escalation paths
vulnerability testing and remediation discipline
change-management governance
third-party dependency control
Resilience is judged by repeatability, not declarations.
Banking and Counterparty Acceptance
Banks and payment institutions act as secondary supervisors.
They typically assess:
ownership transparency
AML execution quality
custody and segregation logic
incident-response readiness
regulatory-transition planning
A weak operating model loses bankability quickly.
Scaling Without Regulatory Drift
Growth is a supervisory test.
A stable scaling model links:
transaction volume to AML capacity
client growth to onboarding resources
custody exposure to operational oversight
new products to formal approval processes
Uncontrolled growth is treated as structural risk.
Long-Term Obligations After Authorisation
Operating a licensed crypto business in Portugal requires:
continuous regulatory reporting
maintenance of capital and safeguards
periodic audits and control testing
notification of material changes
alignment with evolving EU rules
Authorisation is the start of responsibility, not the end.
Why Portugal as an EU Base
Portugal works when approached as an institutional EU base, not as a shortcut.
Correctly built, it offers:
regulatory credibility
EU passporting under MiCA
predictable supervisory logic
strong talent and infrastructure access
long-term stability for regulated crypto operations
Request a Crypto Licensing Assessment
Supervisory Reality and Post-Authorisation Operation in Portugal
How a Portuguese Crypto Business Is Actually Tested After Approval
Obtaining a crypto licence in Portugal is not the end of regulatory scrutiny. It is the beginning of a continuous supervisory relationship in which behaviour, not documentation, determines whether the business remains viable. Both AML supervision and MiCA-era prudential oversight are exercised as ongoing control mechanisms, not periodic formalities.
This section explains how supervision is applied in practice once a Portuguese crypto business becomes operational, what regulators, banks, and counterparties actually test over time, and how a structure must be built to remain stable under pressure, growth, and market stress.
Supervision as a Continuous Operating Condition
Portuguese supervision does not operate on a “file once, forget” logic. From the moment activity begins, the firm is assessed as a live financial operator.
Supervisory pressure typically appears through:
targeted follow-up requests tied to transaction behaviour
deep dives into specific client files or transaction chains
consistency checks between declared policies and observed actions
scrutiny triggered by market events, incidents, or partner alerts
The core expectation is simple: every significant decision must be explainable, attributable, and reconstructable long after it was made.
Behavioural Consistency as the Primary Test
Why Policies Alone Do Not Protect the Licence
Portuguese supervisors assume that policies can be written quickly. What they test is whether the organisation behaves in accordance with them when incentives, time pressure, or commercial risk intervene.
A defensible operating model shows:
the same risk logic applied across onboarding, monitoring, and escalation
consistent treatment of similar cases over time
no unexplained deviations between comparable client profiles
documentation that reflects real decisions, not after-the-fact rationalisation
Inconsistency is treated as a governance weakness, even when individual decisions appear reasonable in isolation.
Decision Ownership and Accountability
Supervisors expect to see who actually decides.
They routinely assess:
whether AML and compliance officers have real authority
whether management overrides are documented and justified
whether exceptions are rare, controlled, and approved
whether decision-makers can be identified clearly
Structures where responsibility is diluted across teams, vendors, or group entities are treated as unstable.
AML Supervision After Registration
From Registration to Enforcement Reality
While initial VASP registration focuses on AML readiness, post-registration supervision focuses on AML execution. This is where most operational failures occur.
Supervisory attention concentrates on:
how risk assessments are updated as activity evolves
how alerts are investigated, not just closed
how SAR decisions are made and documented
how staff respond to complex or borderline cases
The absence of SARs is not a sign of strength. It is often a trigger for questions.
Alert Handling as a Quality Signal
Alert handling is reviewed as an operational discipline.
A stable model demonstrates:
clear investigation steps
use of multiple data sources
articulated reasoning for conclusions
internal review or escalation where appropriate
Closing alerts mechanically or without narrative undermines credibility.
Retention and Reconstruction Capability
Portuguese supervision places strong emphasis on record retention.
A defensible system allows reconstruction of:
why a client was accepted
how risk was assessed at onboarding
how monitoring thresholds evolved
how alerts were resolved
why SARs were filed or not filed
Inability to reconstruct is treated as a governance failure, not an IT issue.
Travel Rule Execution Under Real Conditions
Travel Rule as a Transaction Process
Travel Rule compliance is evaluated as part of transaction processing, not as a standalone obligation.
Supervisors examine:
data completeness and accuracy
secure transmission and storage
exception handling for counterparties
treatment of failed or partial data exchanges
Systems that rely on manual intervention do not scale and are quickly exposed under volume.
Unhosted Wallet Risk Management
Unhosted wallets are not prohibited, but they are scrutinised.
Expected controls include:
enhanced due diligence triggers
behavioural analysis of wallet activity
transaction limits or monitoring intensification
management sign-off for elevated risk
Treating unhosted wallets as routine is a common supervisory red flag.
Governance Functioning Under Supervision
Board and Management Involvement
Governance is assessed through behaviour, not structure charts.
Supervisors look for evidence that:
the board receives meaningful compliance and risk reporting
management discusses incidents and weaknesses openly
challenge and dissent are recorded
corrective actions are tracked and closed
Boards that only approve strategies without engaging in risk oversight are viewed as weak.
Local Authority and Substance
Portugal requires genuine local control.
Supervisors test:
whether key decisions can be made locally
whether escalation does not depend on offshore approval
whether compliance and risk functions are independent
whether local staff have operational authority
Remote-control models are systematically challenged.
Custody and Asset Protection in Practice
Segregation as an Operational Reality
Custody supervision focuses on asset protection behaviour.
A credible model includes:
legal segregation of client assets
operational segregation in wallets and accounts
frequent reconciliation with defined escalation thresholds
documented ownership records accessible on demand
Ambiguity around asset ownership is treated as a critical risk.
Key Management Discipline
Key management is examined through access and control.
Supervisors expect:
multi-person access controls
defined approval workflows
secure storage and backup procedures
tested recovery processes
Single-person control or undocumented access paths are unacceptable.
Loss and Incident Scenarios
Supervisors expect realistic planning.
A mature model includes:
scenarios for operational error
scenarios for internal fraud
scenarios for protocol failure
client communication strategies
Optimistic assumptions undermine trust.
Technology and Operational Resilience
ICT Risk as a Supervisory Topic
Technology is supervised as financial infrastructure.
Regulators assess:
ownership of ICT risk
incident response authority
testing and remediation discipline
third-party dependency management
Lack of internal understanding of core systems is viewed negatively.
Incident Response Expectations
When incidents occur, supervisors expect:
immediate containment actions
accurate impact assessment
timely notification
structured remediation plans
Delayed or incomplete disclosure materially worsens outcomes.
Change Management Discipline
Every platform change is treated as a potential risk event.
Expected controls include:
documented change approval
risk assessment before deployment
testing and rollback procedures
post-implementation review
Silent releases are routinely uncovered during reviews.
Outsourcing and Group Structures
Outsourcing Does Not Transfer Responsibility
Outsourcing critical functions does not reduce supervisory expectations.
Supervisors evaluate:
due diligence on providers
contractual control and audit rights
fallback arrangements
ongoing monitoring of performance
Critical functions without contingency plans are flagged.
Intragroup Arrangements
Group structures are scrutinised closely.
A defensible setup includes:
arm’s-length service agreements
clear accountability lines
retention of control by the Portuguese entity
independence of control functions
Structures suggesting that Portugal is a front entity are challenged aggressively.
Banking and Payment Partner Scrutiny
Banks as Shadow Supervisors
Banks and payment institutions apply standards similar to regulators.
They typically assess:
AML execution capability
governance credibility
custody and segregation logic
incident history
MiCA transition readiness
Loss of banking access often occurs before formal regulatory action.
Managing Bank Reviews
Successful firms:
maintain regulator-aligned documentation
respond quickly and consistently
avoid contradictory narratives
disclose incidents proactively
Bank trust is cumulative and fragile.
Scaling Under Supervision
Growth as a Risk Event
Rapid growth is not inherently positive.
Supervisors assess:
whether controls scale with volume
whether staffing grows proportionally
whether monitoring thresholds are recalibrated
whether governance keeps pace with complexity
Uncontrolled growth is treated as a failure of management.
Product Expansion Governance
Adding products or features requires discipline.
Expected practices include:
formal approval processes
impact analysis on AML and custody
updates to disclosures and procedures
post-launch monitoring
Feature creep without approval is a recurring failure pattern.
Inspections, Audits, and Reviews
Types of Reviews You Will Face
Operational firms are reviewed by multiple parties:
AML inspections
prudential or conduct reviews
bank and EMI audits
independent IT and security audits
Consistency across all these reviews is critical.
Preparing for MiCA-Era Inspections
MiCA inspections will focus on:
governance effectiveness
independence of control functions
consumer protection mechanisms
market integrity controls
operational resilience
Preparation must be continuous, not reactive.
Long-Term Cost of Compliance
Predictable Cost vs. Crisis Cost
Compliance costs increase with scale, but predictably when planned.
Key cost drivers include:
compliance and risk staffing
ICT security and audits
insurance and guarantees
reporting and governance overhead
Reactive remediation is significantly more expensive than proactive design.
Compliance as Commercial Infrastructure
Well-built compliance delivers commercial advantages:
stronger bankability
lower counterparty friction
smoother MiCA transition
reduced enforcement risk
Compliance becomes an asset, not a burden.
Cultural Signals Regulators Notice
Compliance Culture
Culture is inferred from behaviour.
Signals supervisors observe include:
willingness to escalate issues
absence of blame-shifting
clarity of decision ownership
respect for control functions
A growth-at-all-costs culture undermines even strong frameworks.
What a Stable Portuguese Crypto Business Looks Like
A sustainable Portugal-based crypto operation typically shows:
real operational substance
consistent AML and risk behaviour
strong governance and decision discipline
credible custody and asset protection
resilience under incidents and growth
readiness for MiCA supervision
This profile is built through operating discipline, not filings.
Strategic Operating Architecture for a Portugal-Based CASP
How a MiCA-Ready Crypto Business Must Be Structured From Day One
A Portuguese crypto licence delivers value only when the business is architected as a coherent institutional system, not as a collection of policies assembled for approval. Regulators, banks, auditors, and counterparties evaluate whether governance, compliance, technology, finance, and decision-making operate as a single organism. Fragmentation is the most common reason licences lose practical value after approval.
This section explains how a Portugal-based CASP must be structurally built, how internal components must interact, and what design choices determine long-term survivability under MiCA supervision.
One Institution, Not Parallel Silos
A compliant CASP cannot operate as disconnected departments.
A viable operating architecture demonstrates:
alignment between governance authority and operational execution
AML logic that directly influences product and client design
custody and treasury controls that are reflected in accounting
technology decisions that match regulatory risk tolerance
records that trace decisions across functions
Supervisors and banks actively look for contradictions between these layers.
Governance Architecture That Holds Under Pressure
Management Body as a Control Organ
The management body is assessed as an active risk owner.
A stable governance setup shows:
collective understanding of crypto-specific risks
approval of risk appetite tied to actual limits
documented challenge, not unanimous rubber-stamping
direct oversight of incidents and remediation
Boards that delegate all responsibility downward lose credibility quickly.
Local Decision Authority
Portugal requires real local control, not symbolic presence.
Effective models ensure:
management can halt activity without parent approval
compliance can block launches independently
budgets for remediation are controlled locally
crisis decisions are not delayed by group politics
Any structure where decisive authority sits abroad creates supervisory tension.
Committees That Actually Function
Committees are tested through minutes and outcomes.
Regulators expect to see:
risk committees reviewing exposure trends
AML committees resolving escalated cases
technology or security committees overseeing resilience
Meetings without substance are identified immediately.
Capital Logic and Financial Discipline
Capital as Risk Infrastructure
Capital is evaluated in context, not isolation.
Supervisors assess:
relationship between custody exposure and capital
liquidity under stress scenarios
dependency on group funding
sustainability of operating losses
Capital that exists only to satisfy a minimum threshold is treated as weak.
Treasury and Asset Segregation
Financial architecture must be enforceable.
A defensible model includes:
legally segregated client accounts
operational separation of wallets
daily or near-real-time reconciliation
escalation thresholds for discrepancies
Unclear asset ownership is one of the fastest routes to enforcement action.
AML Embedded Into Operations
Risk-Based Approach as a Living System
Risk assessment must drive behaviour.
Operational indicators include:
differentiated onboarding flows
adaptive monitoring thresholds
periodic reassessment of client profiles
documented rationale for risk decisions
Static risk matrices signal institutional immaturity.
Alert Handling and Escalation
AML quality is measured at the alert level.
Regulators review:
investigation depth
use of multiple data sources
escalation discipline
management involvement in sensitive cases
Closing alerts without analysis is a recurring failure pattern.
SAR Governance
SAR decisions must be explainable.
Effective structures show:
clear suspicion logic
internal approval records
consistency across similar cases
preserved evidence
Both over-reporting and under-reporting attract scrutiny.
Travel Rule as Infrastructure
Built Into Transaction Flow
Travel Rule compliance must be automated and embedded.
Supervisors examine:
data capture at initiation
secure transmission mechanisms
exception handling logic
reconciliation with blockchain data
Manual handling collapses under scale.
Unhosted Wallet Governance
Unhosted wallets are controlled through risk, not prohibition.
Expected measures include:
enhanced due diligence triggers
transaction caps or intensified monitoring
behavioural analytics
senior approval for elevated exposure
Treating unhosted wallets as neutral is a regulatory red flag.
Technology Governance Beyond IT
Ownership of ICT Risk
Technology risk must have a named owner.
Supervisors assess:
who can shut down systems
who approves changes
who owns incident response
how third-party risk is controlled
Lack of executive-level understanding of systems undermines confidence.
Cybersecurity and Incident Handling
Incident response defines credibility.
Regulators expect:
classification of incidents
immediate containment authority
forensic capability
transparent communication
Delayed disclosure magnifies consequences.
Change Management Discipline
Every system change is a risk event.
A resilient model includes:
documented approval flows
pre-deployment testing
rollback capability
post-implementation review
Silent releases are routinely discovered.
Custody as a Core Supervisory Focus
Control Over Keys
Custody is assessed through access control.
Supervisors test:
quorum requirements
separation of duties
emergency access rules
backup and recovery processes
Single-person key control is unacceptable.
Loss Scenarios and Recovery
Planning must be realistic.
Expectations include:
internal fraud scenarios
operational error scenarios
protocol failure scenarios
client communication playbooks
Optimism is not a control.
Staffing and Human Capital
Staffing as a Risk Metric
Headcount is monitored continuously.
Supervisors consider:
workload per compliance officer
turnover in key roles
reliance on contractors
training depth
Chronic understaffing signals structural non-compliance.
Institutional Knowledge
Training must be ongoing.
Effective programmes include:
onboarding training
scenario-based AML drills
incident response simulations
governance training for executives
Generic e-learning is insufficient.
Outsourcing and Third-Party Risk
Responsibility Cannot Be Outsourced
Outsourcing does not reduce accountability.
Supervisors assess:
vendor due diligence
contractual control rights
audit access
contingency planning
Critical services without fallback plans are flagged.
Intragroup Services
Group structures are examined closely.
A defensible setup shows:
arm’s-length pricing
documented service scope
retained control locally
independent compliance authority
Front-entity signals are challenged aggressively.
Product Design and Client Protection
Product Governance
Products are treated as compliance topics.
Supervisors review:
fee transparency
risk disclosures
suitability for target users
alignment with licence scope
Marketing claims unsupported by controls trigger review.
Complaint Handling as Control Feedback
Complaints are regulatory signals.
Expected practices include:
structured intake
root-cause analysis
escalation of systemic issues
documented outcomes
Ignored complaints often escalate into inspections.
Scaling Without Structural Drift
Growth Governance
Growth must be controlled.
Regulators look for:
staffing ratios linked to volume
recalibration of monitoring systems
governance approval for expansion
periodic risk reassessment
Unmanaged growth is treated as negligence.
Geographic Expansion
Cross-border activity adds complexity.
Expectations include:
jurisdictional risk analysis
consistent AML application
alignment with licence perimeter
Fragmented expansion undermines supervision.
Internal Assurance and Self-Testing
Independent Review
Self-testing is expected.
A mature model includes:
internal audits
thematic reviews
remediation tracking
board oversight
No self-critique implies immaturity.
Learning Behaviour
Regulators value adaptation.
They assess whether:
findings lead to change
repeat issues disappear
root causes are addressed
Recurring minor issues escalate quickly.
Culture as a Supervisory Factor
Compliance Culture
Culture is inferred from behaviour.
Signals include:
openness about problems
absence of blame-shifting
respect for control functions
clarity of ownership
A growth-at-all-costs culture erodes trust.
Commercial Meaning of This Architecture
This architecture exists to ensure that the licence retains value.
A well-built Portugal CASP gains:
durable bankability
predictable supervisory interaction
smoother MiCA transition
lower enforcement risk
higher strategic credibility
Compliance becomes commercial infrastructure, not friction.
FAQ
MiCA supersedes the existing VASP registration regime. If you are already registered with the BdP, you must apply for full MiCA CASP Authorization with the new designated regulator (expected to be CMVM) by the end of the transitional period (December 30, 2025). Failure to obtain CASP Authorization by this date means your company can no longer legally operate in Portugal or the EU. The BdP will continue to supervise the AML aspects of your business.
The minimum initial capital required depends on the scope of services: €50,000 for advisory and order transmission; €125,000 for execution and trading venue operations; and €150,000 for custody/wallet provision and MTF operations. Companies must also maintain continuous own funds equal to the greater of this minimum or 25% of their fixed overheads.
While the Banco de Portugal (BdP) handles the initial VASP registration and remains the AML/CFT supervisor, the final MiCA CASP Authorization is expected to be granted by the Comissão do Mercado de Valores Mobiliários (CMVM), the Portuguese Securities Market Commission. Authorization from the CMVM is what enables the critical EU Passporting right.
For corporations, profits are taxed at the standard corporate rate (21% or 5% in MIBC). For individuals, Portugal introduced a tax regime in 2023. Capital gains on crypto-assets held for more than 365 days remain generally tax-exempt (as long as the activity is not deemed professional), while short-term gains (under 365 days) are taxed at a flat rate of 28%. Income from mining or staking is generally taxed at progressive income rates.
Yes. Establishing a sufficient level of economic substance in Portugal is a strict requirement for both the current VASP registration and the future CASP authorization. This requires: a dedicated physical office lease, at least one locally resident manager/director, and an experienced, locally appointed AML Compliance Officer (MLRO). Generic virtual offices are not accepted by the Banco de Portugal.
The DAC8 Directive (effective January 1, 2026) imposes mandatory, unified reporting obligations on all CASPs operating in the EU. A CASP in Portugal will be required to automatically report transaction data (including customer identification and values) to the Portuguese tax authorities, who will then exchange this information with other EU member states. This makes tax transparency and accurate record-keeping an integral part of regulatory compliance.
The primary hurdles are the high bar for AML/KYC documentation quality set by the BdP, the lengthy regulatory review timeline (often 6-9 months), and the difficulty in securing a corporate bank account until the VASP registration is secured. The need to demonstrate robust IT infrastructure resilience compliant with DORA is another significant technical hurdle.
Crypto-assets that possess characteristics of traditional financial instruments (such as certain tokenized securities or derivatives) are not governed by the MiCA VASP registration. Instead, they fall under the existing MiFID II regime, requiring a separate and more complex license from the CMVM (similar to an Investment Firm license), which has significantly higher capital and organizational requirements than a standard MiCA CASP license.
