Crypto License in France

Primary Crypto Licensing Services under the French PSAN Regime

Operating as a crypto-asset service provider in France is not a procedural registration exercise. The French PSAN regime is applied as a functional supervisory framework, where regulators assess whether a firm can operate as a real financial control environment under continuous scrutiny.

We provide end-to-end PSAN structuring and regulatory implementation for crypto businesses establishing or scaling operations in France. Our service is designed for exchanges, custody providers, brokers, platforms, and infrastructure operators that require bankable, auditable, and regulator-credible operations, not just formal registration.

Our work focuses on translating your business model into a defensible PSAN operating state: governance that functions in practice, AML controls that withstand Tracfin scrutiny, custody and safeguarding arrangements that protect clients, and operational resilience that survives incidents and growth. We do not produce abstract policies. We build implementable control systems aligned with French supervisory expectations and future MiCA transition requirements.

The outcome is a French crypto operation that can pass regulatory review, maintain banking access, and operate under real market pressure. Where required, the structure is prepared from day one for controlled migration toward MiCA CASP authorisation without rebuilding the organisation under stress.

This service is suitable for firms seeking lawful entry into the French market, remediation of weak PSAN files, or strategic positioning of France as a long-term EU regulatory anchor.

Request a Crypto Licensing Assessment

What We Deliver

Regulatory scope and authorisation strategy

  • Service perimeter memo: PSAN service mapping + MiCA CASP target perimeter

  • Operational flow maps aligned with client journey and fund flows

  • Transition design: PSAN operating continuity vs MiCA end-state readiness (no “automatic conversion” claims) amf-france.org+1

Application pack built as an operating system

  • Governance and internal controls pack (roles, delegations, reporting cadence, conflicts, outsourcing oversight)

  • AML/CTF framework: EWRA methodology, onboarding logic, monitoring governance, reporting workflow

  • ICT, security, and resilience controls: incident playbooks, change management, BCP/DR, auditability

  • Client documentation: terms, disclosures, complaints handling, marketing control framework

Evidence and inspection readiness

  • Evidence register: what the firm must be able to show, where it is stored, how it is produced

  • Walkthrough scripts for AML, monitoring, custody controls (if applicable), and incident handling

  • Version control discipline across policies, evidence, and implementation artefacts

Banking and fiat-rail readiness

  • Bank-facing onboarding pack aligned with regulatory narrative and flow-of-funds logic

  • Counterparty risk positioning: governance credibility, AML effectiveness, and remediation discipline


How the Engagement Works

Phase 1 — Scope lock and risk posture

We define what you do in functional terms (not marketing terms), classify the services, identify custody exposure, and map risk drivers that will shape governance and AML depth.

Phase 2 — Build the operating framework

We draft and align governance, AML/CTF, ICT/security, safeguarding (if relevant), outsourcing controls, and client documentation as one coherent system.

Phase 3 — Submission management and supervisory dialogue

We manage the process as a dialogue: completeness readiness, structured responses to regulator questions, and controlled updates to the pack.

Phase 4 — Transition into MiCA CASP end-state

We convert the operating framework into a MiCA-ready model, with controlled perimeter governance and scalable controls for EU-grade scrutiny.


Regulatory Context in France

Supervisory perimeter

France’s crypto supervisory environment is built around two practical realities: market regulator expectations on organisation and client-facing conduct, and a high bar for AML/CTF enforceability. In the PSAN process, AML robustness and evidence quality are assessed as core viability criteria, not as supporting documents. amf-france.org+1

PSAN is not an EU-wide permission

PSAN is a French national regime. MiCA establishes the EU end-state through CASP authorisation, with transitional arrangements that do not eliminate the need to demonstrate full organisational and operational readiness. France applies an 18-month transition window ending 1 July 2026 under the conditions set by MiCA and national implementation. amf-france.org+2amf-france.org+2


Governance That Survives AMF Questions

Governance as an evidence problem

France does not reward “role naming”. Supervisors test whether governance operates: approvals exist, challenge is documented, escalations are used, and remediation is tracked.

A defensible governance package includes:

  • decision rights and delegations that match the real operating model

  • conflict controls proportionate to platform economics

  • compliance independence with direct escalation to senior management

  • outsourcing oversight that preserves auditability and control ownership


AML/CTF That Works Under Pressure

EWRA-driven onboarding and monitoring

We design AML controls from an enterprise-wide risk assessment that actually drives:

  • CDD/EDD depth

  • ownership and UBO evidencing standards

  • source-of-funds logic linked to behaviour patterns

  • monitoring scenarios calibrated to products and client types

Tracfin-facing reporting discipline

Suspicious reporting is treated as a controlled decision process: investigation notes, rationale, approvals, and “no tipping-off” controls are built into workflows (not stated as principles). (Tracfin is the FIU within France’s AML system.) fatf-gafi.org

Travel Rule as an operational capability

We describe Travel Rule execution as a process capability: how data is collected, validated, transmitted, reconciled, and audited across transfer scenarios — without hard-coding vendor names or universal thresholds.


Custody and Safeguarding Where You Control Keys

If custody is in scope, safeguarding becomes a central licensing theme. We implement:

  • segregation design (legal + operational)

  • wallet architecture and reconciliation routines

  • access controls, approvals, and tamper-resistant logging

  • recovery procedures and incident playbooks with testing logic

  • insider-risk mitigation (screening, access reviews, separation of duties)


ICT, Resilience, and Outsourcing Auditability

Operational resilience without “buzzword compliance”

We structure resilience evidence around service criticality: dependency mapping, justified recovery objectives, tested BCP/DR, and incident response with remediation loops.

Outsourcing that does not weaken supervision

Outsourcing does not shift responsibility. The framework must preserve:

  • audit and access rights

  • incident cooperation obligations

  • change notification duties

  • exit and transition feasibility for critical providers


Client Protection, Marketing Discipline, and Complaints

France is strict on client communications. We ensure:

  • terms and disclosures match actual platform behaviour

  • pricing is transparent, including indirect economics where relevant

  • complaints handling is time-bound, documented, and feeds risk governance

  • marketing review is compliance-controlled and avoids unbalanced claims


Stablecoins and MiCA Classification Risk

If you list, custody, or facilitate stablecoin exposure, we treat classification properly: EMT vs ART implications, issuer transparency checks, listing governance, and risk disclosure logic aligned with the role you play (platform, custodian, distributor, issuer). We avoid absolute statements like “always requires X licence” and instead document the decision logic.


Supervisory Dialogue and Deficiency Management

In France, progress is iterative. What matters is response quality: direct answers, operational evidence, and remediation plans with ownership and testing logic — not legal verbosity.

A strong operating model assumes retrospective review: any onboarding decision, alert outcome, override, incident judgement, or escalation should be reconstructible months later from records, not from staff recollection.


Enforcement Risk Patterns We Design Against

Systemic weaknesses, not clerical mistakes, drive escalation. Typical triggers include:

  • inconsistent EDD and weak source-of-funds logic

  • alert backlogs or non-auditable investigations

  • unclear accountability between compliance, tech, and operations

  • outsourcing chains that reduce auditability

  • repeated incidents without structural remediation

  • token/service misclassification and uncontrolled product drift

The most persuasive defence is an evidence trail: logs, minutes, testing outputs, and tracked remediation.

Request a Crypto Licensing Assessment

Banking and Fiat Rails in France: Designing for Acceptance, Not Hope

Why banking is the real bottleneck

In France, PSAN registration is a necessary condition for lawful operation, but it is rarely a sufficient condition for stable fiat access. Banks and payment institutions apply their own de-risking logic, which is influenced by correspondent banking constraints, internal appetite, sector-wide risk posture, and the credibility of the applicant’s control environment. A PSAN file that passes registration may still fail banking onboarding if it cannot demonstrate operational discipline, transparent fund-flow logic, and enforceable AML controls at the level banks expect.

The practical implication is that banking readiness must be engineered as part of the licensing programme, not handled as a post-registration “business development” task. If banking becomes an afterthought, the firm typically resorts to patchwork solutions: unstable payment providers, fragmented flows, inconsistent narratives, and operational behaviours that later undermine supervisory confidence.

Our approach treats banking as an evidence and design problem. We structure the bank-facing onboarding pack to mirror the regulatory narrative, but written in banking-risk language: how money enters, how it is controlled, how it is reconciled, and how anomalies are investigated. This prevents a common failure pattern where a firm presents one story to regulators and a different story to banks.

Flow-of-funds architecture that withstands scrutiny

Banking acceptance in France is heavily driven by whether the bank can reconstruct the movement of funds end-to-end and understand what triggers controls. “We do crypto” is not a narrative. A bank wants a traceable model:

  • client onboarding and acceptance logic

  • funding sources and permitted rails

  • conversion points between fiat and crypto

  • settlement logic (instant vs batch, internal ledger vs external settlement)

  • segregation between client money and operating money

  • withdrawal governance and exception handling

  • reconciliation and ledger integrity

A credible flow-of-funds architecture includes diagrammed flows, written control points, and evidence outputs. It does not rely on vague statements such as “segregated accounts exist” without showing how segregation is enforced operationally. For exchange or broker models, special attention is needed for spreads, fees, and revenue recognition because banks will ask where the firm profits and how it prevents hidden value transfer.

Source-of-wealth and beneficial owner credibility

For banking in France, beneficial owner transparency is not an abstract governance element. It is a gatekeeping variable. Banks typically test whether the firm can produce consistent, fact-based source-of-wealth narratives for key owners and controllers, especially where owners are international, have complex holdings, or operate in adjacent high-risk sectors.

A weak pattern is relying on static owner declarations without structured evidence logic. A strong pattern is documenting the risk-based decision logic: what level of SoW/SoF depth is applied for owners, when it is refreshed, what triggers escalation, and how discrepancies are resolved.

The key is consistency: ownership and SoW logic must align across the PSAN narrative, internal AML procedures, and bank onboarding responses. Inconsistency is interpreted as lack of control ownership, not as an administrative mismatch.

Payment provider strategy and concentration risk

A single-rail dependency is fragile. Many crypto businesses build around one bank account or one PSP relationship and discover later that operational stability depends on a counterparty they cannot control. In France, concentration risk is both a banking concern and a supervisory concern when it threatens continuity of service and client protection.

A resilient strategy typically separates:

  • client intake rails from treasury rails

  • operational revenue accounts from client pass-through accounts (where relevant)

  • primary and fallback payment routes

  • high-risk merchant exposure from core client funding flows

These design decisions must remain consistent with the authorised perimeter and client disclosures. “Shadow rails” that are used operationally but not reflected in documentation create long-term fragility and supervisory exposure.

Bank-facing evidence pack: what actually works

A bank onboarding pack should not be a pile of policies. It should be a structured dossier that answers banking questions in their own order:

  • corporate profile and operating geography

  • regulated status and supervisory posture

  • services provided, client types, target markets

  • AML governance (who can block activity, how escalation works)

  • onboarding and monitoring methodology, with examples of evidence outputs

  • transaction monitoring and investigation lifecycle

  • sanctions screening approach and quality controls

  • Travel Rule capability as a process, not as marketing

  • custody model (if any), segregation, reconciliation, incident logic

  • data governance, access control, and auditability

  • incident history handling and remediation discipline

  • flow-of-funds maps and reconciliation cadence

  • counterparties: liquidity providers, custodians, key vendors, critical sub-providers

  • contingency planning and exit logic for critical dependencies

Banks care about clarity, not legal rhetoric. Over-argumentation tends to increase suspicion. Operational detail, explained plainly, tends to reduce it.


Supervisory Dialogue in France: Response Engineering and Deficiency Closure

Registration and authorisation as an iterative process

In France, supervisory progress is rarely linear. The file moves through questions, clarifications, deficiency notices, and iterative document refinement. The difference between a stalled file and a progressing file is often not the initial submission but the quality of response engineering.

Regulators typically test whether a firm:

  • understands its own operating model

  • can explain decisions without contradictions

  • can provide evidence rather than assurances

  • can remediate structural issues rather than argue them away

  • keeps a controlled version history across the pack

A common mistake is treating each query as a stand-alone exchange. A more successful approach treats the dialogue as a controlled system: each regulator comment is mapped to specific document changes, evidence additions, and updated implementation plans — with consistent cross-references across governance, AML, ICT, and client-facing materials.

How to answer without creating new problems

Responses that “sound good” often create unintended scope expansion. For example, stating “we will monitor X” can be interpreted as a commitment that must be implemented and evidenced. If X is not truly required or not operationally feasible, the firm creates a future failure point.

High-quality responses therefore follow three principles:

  • answer the question directly, in operational terms

  • commit only to controls that are feasible and testable

  • provide evidence artefacts or a concrete remediation plan with ownership and testing logic

Where regulators identify ambiguity, they are usually asking for one of three things: a clearer perimeter, stronger evidence, or a more realistic operating explanation. The fastest route is not more text; it is more coherence.

Deficiency closure discipline

Deficiency notices are often manageable if the firm treats them as a structured remediation programme. A credible closure approach includes:

  • deficiency register: each point, owner, action, deadline

  • remediation artefact list: what will be produced (policy update, workflow change, evidence log, training)

  • testing method: how effectiveness will be verified

  • board/management sign-off: evidence that the firm owns the remediation

  • version control: traceability between old and updated sections

Regulators often look favourably on firms that acknowledge issues and implement structural fixes quickly. The opposite — denial, minimisation, or cosmetic edits — increases scrutiny.

Evidence design for retrospective reconstruction

French supervision is evidence-driven: supervisors assume retrospective review. Any onboarding decision, override, escalation, suspicious reporting decision, incident classification judgement, or product perimeter decision may be reviewed long after the fact. The test is whether the decision can be reconstructed without relying on memory.

This pushes firms toward systems thinking:

  • logs are time-stamped, attributable, and consistent across tools

  • manual overrides are justified and reviewed

  • investigation files include reasoning, not only outcomes

  • approvals are documented and tied to decision rights

  • remediation actions are tracked to closure

If a firm cannot reconstruct decisions, supervisors often treat that as equivalent to not having controls.

Escalation mechanics that actually work

Many firms have escalation charts. The question is whether escalations happen. Supervisors frequently detect “paper escalations” through behavioural signals: recurring anomalies without escalation records, decisions made by commercial staff without compliance involvement, or incidents handled informally without documentation.

A defensible escalation model defines:

  • mandatory escalation triggers (not optional)

  • who can pause onboarding, restrict withdrawals, halt certain services

  • how disagreements between business and compliance are resolved

  • what documentation is required for escalation closure

  • how management receives and acts on escalations

The purpose is not bureaucracy. The purpose is to demonstrate that risk ownership exists and that the compliance function is empowered.


Product Perimeter Control: Preventing Regulatory Drift as the Platform Evolves

Why perimeter control is a primary survival system

Crypto businesses evolve continuously. Tokens change. Features expand. New jurisdictions become commercially attractive. Integrations multiply. The fastest way to fall out of regulatory alignment is not a deliberate breach — it is gradual drift.

French supervision expects the firm to treat perimeter control as an ongoing governance function. This means changes are assessed before they are implemented, not explained after they are live.

Perimeter drift is especially common in:

  • adding new tokens with unclear classification

  • introducing yield-like features or rewards programmes

  • expanding into new client segments (retail → professional/institutional)

  • enabling new transfer types (unhosted wallets, cross-chain, DeFi access)

  • adding custody-like capabilities through technical control

  • modifying fee structures and execution logic in a way that changes the product character

A mature platform uses a structured change governance process that triggers regulatory assessment automatically when change proposals hit certain criteria.

Asset listing governance that survives scrutiny

For platforms that list multiple assets, listing governance is not a marketing or product decision. It is a compliance and conduct decision. A defensible listing process typically includes:

  • initial asset due diligence: technology, governance, liquidity, manipulation risk

  • legal classification logic and documentation

  • AML risk review: exposure to mixers, scam typologies, sanctions risk indicators

  • disclosure review: ensuring client-facing risk language matches the asset risk profile

  • approval by defined committee/decision rights

  • post-listing monitoring: triggers for delisting, restrictions, enhanced monitoring

Supervisors often judge firms by their willingness to restrict or delist when risk increases. “We list what the market wants” is not a defensible posture. “We list what we can supervise” is.

Managing stablecoins and role-specific exposure

Stablecoins introduce classification and disclosure complexity. A robust posture avoids absolute statements and instead documents the role logic:

  • are you merely listing, or facilitating issuance/distribution?

  • do you hold client fiat, or only crypto?

  • does the stablecoin interact with payment-like features?

  • how are reserve risks disclosed and monitored?

  • what triggers enhanced scrutiny or restrictions?

The key for France is not to treat stablecoins as a “single bucket.” The risk narrative differs materially across assets, and disclosure must reflect that.

Unhosted wallets and enhanced controls

Unhosted wallet interaction is often where AML frameworks break. Supervisors do not necessarily require uniform hard bans, but they expect clear decision logic and operational enforceability:

  • when unhosted withdrawals are permitted

  • what verification or risk checks apply

  • what thresholds trigger enhanced review

  • how suspicious patterns are escalated and documented

  • how exceptions are handled without informal workarounds

Controls must balance operational feasibility with risk appetite. The worst position is to claim strict controls and then operate informally.

DeFi exposure and responsibility boundaries

Where a platform provides access to DeFi protocols or liquidity aggregation, the compliance question becomes: what control does the firm exercise, and what client expectations does it create?

A defensible approach:

  • defines whether access is execution, routing, or merely informational

  • documents responsibility boundaries in client terms

  • assesses smart contract and protocol risk

  • updates disclosures to reflect failure modes and user risk

  • ensures AML monitoring can still interpret flows

If responsibility boundaries are unclear, supervisors often treat that as a governance problem.

Change governance: the “pre-launch” discipline

A mature change governance process typically includes:

  • regulatory classification check

  • AML impact analysis

  • custody and operational risk review

  • client disclosure and marketing review

  • governance approval (committee/board where relevant)

  • implementation plan with evidence outputs

  • post-launch monitoring plan and contingency actions

This turns innovation into a controlled process rather than a source of surprise. France does not prohibit innovation; it penalises uncontrolled change that increases customer risk or undermines auditability.


Outsourcing Chains, Fourth-Party Risk, and Auditability Under French Expectations

Outsourcing does not outsource responsibility

Many PSANs rely on layered outsourcing: cloud infrastructure, analytics tools, KYC vendors, custody technology, customer support platforms, and incident response providers. French expectations apply not only to direct vendors but also to critical sub-providers where failure would impair compliance or client protection.

Supervisory focus is practical:

  • can you explain the dependency chain?

  • can you access logs and evidence?

  • do contracts preserve audit and access rights?

  • can you exit without service collapse?

  • does outsourcing reduce your control, or strengthen it?

A weak outsourcing posture is one where operational control becomes invisible behind vendors. A strong posture is one where the firm can demonstrate oversight and accountability even with outsourced execution.

Contract standards that reduce supervisory friction

Contracts should be written to preserve:

  • scope clarity and performance expectations

  • incident notification and cooperation obligations

  • audit rights and regulatory access support

  • data protection, confidentiality, and retention duties

  • change notification and approval mechanisms

  • termination and exit support, including data return and migration assistance

Where critical functions are outsourced, the firm should be able to show that it can continue operating if the vendor fails — not instantly, but through a credible transition plan.

Data flow mapping and cross-border implications

Data flows are not just GDPR formalities. In a crypto operating model, data flows define auditability: where logs exist, how quickly evidence can be retrieved, and who can access it.

A defensible model includes:

  • mapping of personal data and operational data stores

  • clarity on where monitoring data is processed and retained

  • access controls and privileged access logging

  • retention rules that align with AML requirements

  • realistic handling of data subject requests without compromising AML recordkeeping

Supervisors typically do not demand data localisation as an ideology. They demand transparency and control.

Vendor oversight as an ongoing function

Due diligence is not a one-off. Mature firms implement:

  • periodic reassessment and risk scoring of vendors

  • performance and incident trend review

  • verification that contractual obligations remain fit for purpose

  • testing of exit plans, at least table-top or partial migrations for critical systems

Exit planning is often the weakest point. Without it, vendor failure becomes a regulated incident that can force service restriction or withdrawal limitation, which then triggers both supervisory and reputational damage.


Operating Under MiCA Transition: Building a Controlled Migration Without Breaking the Business

The transition must be treated as a programme, not a promise

For France-based firms, MiCA defines the EU end-state: CASP authorisation with EU-wide passporting mechanics. The practical risk is treating PSAN as “good enough” and postponing MiCA readiness until the transition window is almost over. That approach typically forces rushed remediation, hurried documentation changes, and increased supervisory friction.

A controlled transition approach:

  • defines target CASP perimeter early

  • assesses gaps between PSAN operating model and MiCA expectations

  • upgrades governance and ICT controls in a scalable manner

  • aligns client documentation and marketing discipline with the higher standard

  • builds prudential planning and sustainability narratives that can withstand EU-grade scrutiny

Avoiding dual-system chaos

A common failure pattern during transition is running two incompatible operating narratives:

  • PSAN narrative for France

  • MiCA narrative for future EU scale

If those narratives diverge, internal teams behave inconsistently, evidence trails fragment, and external counterparties (banks, payment partners, institutional clients) lose confidence.

The correct approach is to treat PSAN as the base layer and build MiCA readiness as structured enhancements that remain consistent with current operations. The firm should not “pretend” it is already a MiCA CASP, but it should design controls so they will not need to be rebuilt later.

Prudential credibility without over-claiming

Even where PSAN is framed as a registration route, supervisory and counterparty expectations increasingly resemble prudential thinking:

  • sustainable financial planning

  • realistic cost modelling for compliance and security

  • liquidity and contingency logic for stress events

  • governance oversight of treasury behaviour and conflict risks

The key is presentation discipline: internal prudential tools should be positioned as governance instruments, not as imported banking obligations. The goal is to demonstrate that the firm will not collapse under compliance cost or operational stress.


Enforcement Resilience: What Keeps Firms Alive When Issues Occur

Regulators sanction patterns, not accidents

In France, the most dangerous condition is not the existence of incidents; it is repeated incidents without structural improvement, or evidence of avoidance and undocumented workarounds.

A resilient firm demonstrates:

  • rapid identification of issues

  • root-cause analysis

  • clear ownership for remediation

  • testing of remediation effectiveness

  • documented closure and follow-up

  • transparent supervisory engagement where necessary

Incident classification and judgement discipline

Not every incident requires notification, but every incident requires a documented classification decision. Supervisors are often more concerned by undocumented judgement than by the event itself.

A robust incident discipline includes:

  • severity criteria and client impact assessment

  • decision rights: who determines materiality

  • internal escalation requirements

  • client communication thresholds

  • remediation and post-incident testing

  • evidence retention and audit trails

Cultural signals regulators notice

Culture is observed through behaviour:

  • are staff empowered to escalate, or afraid?

  • do exceptions get documented or hidden?

  • does compliance block when needed?

  • does management follow through on remediation?

A culture that protects short-term growth at the expense of control integrity becomes visible in evidence trails. A culture that prioritises traceability, escalation, and structured remediation tends to preserve credibility even when problems occur.

Operating Evidence, Audit Trails, and Inspection Readiness in France

Why evidence quality decides outcomes

Under the French PSAN regime, the decisive factor is rarely whether a policy exists. It is whether the firm can prove how decisions were made, who made them, and what happened next. Supervisory reviews consistently test retrospective reconstruction: can an independent reviewer understand an onboarding decision, an alert outcome, or an incident response without relying on staff explanations?

Evidence quality therefore becomes a structural control. Firms that design evidence as an afterthought usually discover gaps only when questioned by supervisors or banks. Firms that design evidence flows intentionally tend to progress faster and with fewer escalation cycles.

A defensible evidence architecture treats logs, approvals, investigations, and remediation records as first-class operational artefacts. They are not “supporting documents”; they are the control itself.

Designing evidence flows across the lifecycle

A robust operating model defines evidence at each stage of the client and transaction lifecycle.

Onboarding evidence typically includes identity verification outputs, beneficial ownership analysis, risk classification rationale, EDD artefacts where applicable, and approval records showing who authorised acceptance and under what conditions.

Ongoing monitoring evidence captures alerts, investigation notes, supporting data extracts, decision rationale, escalation records, and closure approvals. The emphasis is not on volume but on traceability: why was this alert generated, how was it assessed, and why was it closed or reported?

Incident and exception evidence records detection time, impact assessment, decision authority, actions taken, client communication where relevant, and remediation steps. Supervisors expect this trail even when incidents are ultimately classified as non-material.

Audit trails as a governance instrument

Audit trails are not merely technical logs. They are governance instruments that demonstrate control ownership.

A mature setup ensures that:

  • decisions are attributable to defined roles

  • timestamps are consistent across systems

  • versioning allows reconstruction of what policy or rule applied at the time

  • overrides are justified and reviewed

  • follow-up actions are tracked to completion

Where audit trails are fragmented across tools, the firm should still be able to reconstruct a coherent narrative. Inability to do so is often interpreted as a governance weakness, not a tooling issue.


Internal Controls Beyond AML: Financial, Operational, and Conduct Controls

Financial controls as supervisory signals

Even under a registration-based regime, French supervisors increasingly observe financial control maturity as a proxy for organisational stability. Weak financial controls often correlate with weak AML and operational discipline.

A credible financial control framework includes segregation of duties, authorisation thresholds, reconciliation routines, and review mechanisms that prevent single-person dominance over critical processes. This applies not only to fiat flows but also to crypto treasury operations.

Where proprietary trading or liquidity provision exists, boundaries must be explicit. Supervisors pay attention to whether treasury behaviour could conflict with client interests or distort market conduct.

Operational controls and error prevention

Operational errors become regulatory issues when they repeat or remain undocumented. A strong operating model defines:

  • standard operating procedures for critical actions

  • maker-checker logic where feasible

  • compensating controls where segregation is limited

  • escalation for deviations and exceptions

Error logs and corrective actions should feed back into control design. Repeated “human error” without structural change is treated as a governance failure rather than an operational mishap.

Conduct controls and behavioural risk

France places increasing emphasis on conduct. Even outside classical securities law, expectations around fairness, transparency, and integrity apply.

Conduct controls typically cover:

  • employee trading restrictions and disclosures

  • handling of inside or non-public information

  • conflict identification and mitigation

  • disciplinary processes and enforcement

The presence of a code of conduct is not decisive. What matters is enforcement: evidence that breaches are identified, addressed, and resolved consistently.


Client Segmentation and Risk-Differentiated Controls

Why segmentation matters

One-size-fits-all controls rarely survive scale. As client bases diversify, risks multiply. Retail users, professional traders, corporate clients, and institutional counterparties each introduce different vectors of AML, operational, and conduct risk.

French supervisors expect controls to evolve accordingly. Failure to segment clients appropriately is often cited as a root cause of ineffective monitoring and weak disclosures.

Segmentation in onboarding and monitoring

A defensible segmentation framework defines:

  • client categories and eligibility criteria

  • onboarding depth per segment

  • EDD triggers aligned to segment risk

  • monitoring intensity and alert thresholds

  • disclosure standards tailored to sophistication

Segmentation decisions must be documented. Supervisors will test whether the firm understands why a client belongs in a given category and how that classification affects controls.

Disclosure and suitability considerations

Even where formal suitability rules do not apply, France expects proportional risk communication. Disclosures that are adequate for professionals may be misleading for retail users.

A mature model differentiates:

  • language complexity

  • risk emphasis

  • product warnings

  • marketing channels

Inconsistency between segmentation logic and disclosure practice is treated as conduct risk.


Marketing Governance and Public Communications Discipline

Marketing as a regulated surface

In France, marketing is not peripheral. Public statements, website content, social media messaging, and influencer activity are all potential supervisory touchpoints.

Regulators pay attention when marketing language contradicts internal risk assessments or regulatory filings. Claims about safety, compliance status, or performance are scrutinised against operational reality.

Marketing approval workflows

A defensible framework ensures that:

  • marketing materials are reviewed before publication

  • compliance has veto power over misleading claims

  • updates are tracked and versioned

  • withdrawn or corrected materials are archived

This applies equally to third-party marketing, including affiliates and influencers. Outsourcing promotion does not outsource responsibility.

Reputation risk and enforcement exposure

French enforcement actions are often public. Reputational impact frequently exceeds financial penalties. Firms that proactively manage marketing discipline reduce the risk of supervisory escalation triggered by public perception rather than operational failure.


Human Capital, Training, and Control Sustainability

Staffing as a control variable

Supervisors assess whether staffing levels and competencies match operational complexity. Under-resourced compliance or IT security functions are common findings.

A credible staffing model includes role definitions, access mapping, and succession planning for critical positions. Reliance on single individuals without backup is treated as fragility.

Training as evidence, not ceremony

Training programmes must be relevant, periodic, and evidenced. Completion records, testing results, and content updates matter.

Supervisors often examine whether training reflects real risks the firm faces, not generic AML slides. Training that evolves with the business signals maturity.

Managing staff turnover

Turnover is inevitable. Control degradation is not.

Resilient firms implement structured handovers, role-based documentation, and access revocation discipline. Loss of institutional memory is a recognised supervisory risk.


Treasury, Liquidity, and Stress Management

Treasury governance expectations

Even where firms do not hold client fiat, treasury behaviour influences operational stability. Supervisors expect clarity on:

  • permissible assets

  • exposure limits

  • liquidity buffers

  • authorisation thresholds

Uncontrolled treasury activity can undermine safeguarding and conduct obligations.

Stress scenarios and resilience

Stress testing does not need to mirror banking frameworks, but it should be realistic. Firms should understand how they would respond to:

  • sudden volume spikes

  • banking interruptions

  • major market volatility

  • security incidents

Documented stress responses and contingency plans increase supervisory confidence.


Record Retention, Data Integrity, and Legal Defensibility

Record retention as a compliance backbone

French expectations around record retention extend beyond minimum legal periods. Records must remain accessible, intelligible, and protected against tampering.

Retention policies should align AML, accounting, and operational needs. Conflicts between data protection and AML retention must be resolved through documented legal analysis.

Integrity and immutability

Supervisors increasingly test whether records can be altered retrospectively. Systems should prevent unauthorised modification and log any permitted changes.

Where manual records exist, controls must ensure authenticity and completeness.


Managing Cross-Border Exposure and Jurisdictional Risk

Cross-border clients and services

Even domestically focused PSANs attract international users. This introduces additional AML, sanctions, and regulatory exposure.

A defensible approach includes:

  • geographic risk mapping

  • jurisdiction-specific restrictions

  • enhanced monitoring for higher-risk regions

  • documented acceptance rationale

Silence on cross-border exposure is interpreted as lack of awareness.

Cooperation with foreign authorities

Firms must be prepared to cooperate with foreign regulators where legally required. Clear internal procedures for handling requests reduce operational stress and legal risk.


Preparing for Supervisory Inspections and Thematic Reviews

Inspection readiness as a steady state

Inspections are not exceptional events. Firms that scramble at inspection time often reveal deeper weaknesses.

Inspection-ready organisations maintain:

  • centralised documentation repositories

  • clear ownership of regulatory responses

  • trained staff who understand inspection conduct

  • rapid evidence retrieval capability

Thematic reviews and peer benchmarking

Regulators conduct thematic reviews across multiple firms. Prepared firms track sector-wide enforcement trends and assess relevance to their own controls.

Ignoring peer enforcement outcomes is often interpreted as complacency.


Long-Term Compliance Economics and Strategic Positioning

Compliance as an operating cost, not a shock

Sustainable firms plan for compliance costs realistically. Under-budgeting for AML, security, and governance often leads to shortcuts that later trigger enforcement.

A credible financial narrative shows how compliance is funded over time without compromising operations.

Compliance as a growth enabler

In France, strong compliance increasingly functions as a competitive advantage. Firms with mature controls enjoy:

  • smoother supervisory relationships

  • more stable banking access

  • lower enforcement volatility

  • higher institutional trust

This positioning aligns naturally with MiCA’s direction and supports long-term scalability.


Closing Integration Note

This additional layer reinforces the core message of the France page: regulatory success is cumulative. It is built through coherence, evidence discipline, and behavioural consistency over time. Registration or authorisation opens the door, but operational credibility keeps it open.

FAQ

The PSAN Registration was the French national baseline, primarily focused on AML/CFT compliance and limited to operating within France. The CASP Authorization is the new, definitive, full European license established by MiCA Regulation. It demands higher capital, comprehensive organizational and technical resilience (DORA/NIS2), and critically, grants MiCA Passporting rights across the entire EEA.

If your firm relied on the Pre-MiCA PSAN Grandfathering mechanism, the grace period is now effectively over. You were required to have submitted a full CASP Authorization application to the AMF by the final deadline to legally continue operating. Firms operating solely on the old PSAN Registration are now highly restricted or subject to regulatory action, as the national regime has been superseded.

The process is coordinated between two main bodies, reflecting France's dual oversight:

  • The AMF (Autorité des marchés financiers) grants the final AMF Crypto License (the CASP Authorization) after assessing the business model, governance, and organizational requirements.

  • The ACPR (Autorité de contrôle prudentiel et de résolution) handles the mandatory AML/CFT component, specifically reviewing the Audit of French Crypto AML Protocols.

This is a mandatory independent audit required under the CASP framework (and the EU's DORA) to prove that the VASP’s distributed ledger technology (DLT) platform can withstand severe technical and security failures. The testing ensures:

  • Secure key revocation (MPC/multi-sig failure).

  • System integrity during blockchain forks or high congestion.

  • The Business Continuity Plan (BCP) is fully functional, minimizing client access downtime.

The system must utilize advanced RegTech (AI/ML) to score and flag transactions in real-time. Crucially, it must be capable of:

  • Identifying subtle patterns of structuring (breaking up large transfers into small ones).

  • Screening non-custodial wallet addresses against global sanctions lists.

  • Demonstrating a clear, auditable trail to the ACPR of why a transaction was flagged or cleared.

They require the VASP to adopt institutional-grade cyber defense. Key requirements include:

  • Mandatory use of zero-trust network architecture.

  • Annual third-party security audits (IT System Risk Assessment PSAN).

  • A formal Incident Response Team capable of reporting major breaches to the AMF/ACPR within tight, prescribed deadlines (often 4 hours).

It is a deep due diligence process on all Ultimate Beneficial Owners (UBOs) and Key Persons (Directors, MLROs). The AMF verifies:

  • Honourability: No history of financial crime or misconduct.

  • Competence: Relevant professional experience in finance, technology, or regulation.

  • Financial Soundness: The legitimate Source of Wealth (SoW) for all capital invested in the VASP.

The cost is substantial due to compliance requirements, not just fees. While AMF application fees range from €10k to €30k, the total projected cost (excluding the minimum capital requirement) is primarily driven by:

  • Legal & Advisory: €80,000 – €200,000 for application preparation.

  • Technical Audits: €25,000 – €50,000 for DLT and IT system validation.

  • PII: The mandatory Professional Indemnity Insurance for CASP, which can cost €30,000 – €80,000 annually based on Assets Under Management (AUM).

It acts as a primary form of consumer protection under MiCA. The insurance must cover client losses resulting from VASP operational errors, negligence, internal fraud, and failures in key management (e.g., loss of private keys), ensuring that clients are protected even if the VASP suffers a critical security lapse.

The CASP Authorization grants the right (the "passport") to offer the licensed services in any other EEA member state. The VASP must:

  1. Formally notify the AMF of its intent to use the passport in specific countries.

  2. Adhere to host countries' local Conduct of Business and marketing rules (e.g., language requirements, specific disclosures).

The AMF mandates strict compliance with client protection rules, requiring VASPs to:

  • Conduct suitability and appropriateness tests for complex services (e.g., leveraged trading).

  • Provide clear, non-misleading risk warnings.

  • Maintain organizational measures to prevent and manage conflicts of interest.

  • Ensure full legal segregation of client crypto-assets from the VASP's proprietary funds.

Get in touch with our experts