Crypto License in France
Primary Crypto Licensing Services under the French PSAN Regime
Operating as a crypto-asset service provider in France is not a procedural registration exercise. The French PSAN regime is applied as a functional supervisory framework, where regulators assess whether a firm can operate as a real financial control environment under continuous scrutiny.
We provide end-to-end PSAN structuring and regulatory implementation for crypto businesses establishing or scaling operations in France. Our service is designed for exchanges, custody providers, brokers, platforms, and infrastructure operators that require bankable, auditable, and regulator-credible operations, not just formal registration.
Our work focuses on translating your business model into a defensible PSAN operating state: governance that functions in practice, AML controls that withstand Tracfin scrutiny, custody and safeguarding arrangements that protect clients, and operational resilience that survives incidents and growth. We do not produce abstract policies. We build implementable control systems aligned with French supervisory expectations and future MiCA transition requirements.
The outcome is a French crypto operation that can pass regulatory review, maintain banking access, and operate under real market pressure. Where required, the structure is prepared from day one for controlled migration toward MiCA CASP authorisation without rebuilding the organisation under stress.
This service is suitable for firms seeking lawful entry into the French market, remediation of weak PSAN files, or strategic positioning of France as a long-term EU regulatory anchor.
Request a Crypto Licensing Assessment
What We Deliver
Regulatory scope and authorisation strategy
Service perimeter memo: PSAN service mapping + MiCA CASP target perimeter
Operational flow maps aligned with client journey and fund flows
Transition design: PSAN operating continuity vs MiCA end-state readiness (no “automatic conversion” claims) amf-france.org+1
Application pack built as an operating system
Governance and internal controls pack (roles, delegations, reporting cadence, conflicts, outsourcing oversight)
AML/CTF framework: EWRA methodology, onboarding logic, monitoring governance, reporting workflow
ICT, security, and resilience controls: incident playbooks, change management, BCP/DR, auditability
Client documentation: terms, disclosures, complaints handling, marketing control framework
Evidence and inspection readiness
Evidence register: what the firm must be able to show, where it is stored, how it is produced
Walkthrough scripts for AML, monitoring, custody controls (if applicable), and incident handling
Version control discipline across policies, evidence, and implementation artefacts
Banking and fiat-rail readiness
Bank-facing onboarding pack aligned with regulatory narrative and flow-of-funds logic
Counterparty risk positioning: governance credibility, AML effectiveness, and remediation discipline
How the Engagement Works
Phase 1 — Scope lock and risk posture
We define what you do in functional terms (not marketing terms), classify the services, identify custody exposure, and map risk drivers that will shape governance and AML depth.
Phase 2 — Build the operating framework
We draft and align governance, AML/CTF, ICT/security, safeguarding (if relevant), outsourcing controls, and client documentation as one coherent system.
Phase 3 — Submission management and supervisory dialogue
We manage the process as a dialogue: completeness readiness, structured responses to regulator questions, and controlled updates to the pack.
Phase 4 — Transition into MiCA CASP end-state
We convert the operating framework into a MiCA-ready model, with controlled perimeter governance and scalable controls for EU-grade scrutiny.
Regulatory Context in France
Supervisory perimeter
France’s crypto supervisory environment is built around two practical realities: market regulator expectations on organisation and client-facing conduct, and a high bar for AML/CTF enforceability. In the PSAN process, AML robustness and evidence quality are assessed as core viability criteria, not as supporting documents. amf-france.org+1
PSAN is not an EU-wide permission
PSAN is a French national regime. MiCA establishes the EU end-state through CASP authorisation, with transitional arrangements that do not eliminate the need to demonstrate full organisational and operational readiness. France applies an 18-month transition window ending 1 July 2026 under the conditions set by MiCA and national implementation. amf-france.org+2amf-france.org+2
Governance That Survives AMF Questions
Governance as an evidence problem
France does not reward “role naming”. Supervisors test whether governance operates: approvals exist, challenge is documented, escalations are used, and remediation is tracked.
A defensible governance package includes:
decision rights and delegations that match the real operating model
conflict controls proportionate to platform economics
compliance independence with direct escalation to senior management
outsourcing oversight that preserves auditability and control ownership
AML/CTF That Works Under Pressure
EWRA-driven onboarding and monitoring
We design AML controls from an enterprise-wide risk assessment that actually drives:
CDD/EDD depth
ownership and UBO evidencing standards
source-of-funds logic linked to behaviour patterns
monitoring scenarios calibrated to products and client types
Tracfin-facing reporting discipline
Suspicious reporting is treated as a controlled decision process: investigation notes, rationale, approvals, and “no tipping-off” controls are built into workflows (not stated as principles). (Tracfin is the FIU within France’s AML system.) fatf-gafi.org
Travel Rule as an operational capability
We describe Travel Rule execution as a process capability: how data is collected, validated, transmitted, reconciled, and audited across transfer scenarios — without hard-coding vendor names or universal thresholds.
Custody and Safeguarding Where You Control Keys
If custody is in scope, safeguarding becomes a central licensing theme. We implement:
segregation design (legal + operational)
wallet architecture and reconciliation routines
access controls, approvals, and tamper-resistant logging
recovery procedures and incident playbooks with testing logic
insider-risk mitigation (screening, access reviews, separation of duties)
ICT, Resilience, and Outsourcing Auditability
Operational resilience without “buzzword compliance”
We structure resilience evidence around service criticality: dependency mapping, justified recovery objectives, tested BCP/DR, and incident response with remediation loops.
Outsourcing that does not weaken supervision
Outsourcing does not shift responsibility. The framework must preserve:
audit and access rights
incident cooperation obligations
change notification duties
exit and transition feasibility for critical providers
Client Protection, Marketing Discipline, and Complaints
France is strict on client communications. We ensure:
terms and disclosures match actual platform behaviour
pricing is transparent, including indirect economics where relevant
complaints handling is time-bound, documented, and feeds risk governance
marketing review is compliance-controlled and avoids unbalanced claims
Stablecoins and MiCA Classification Risk
If you list, custody, or facilitate stablecoin exposure, we treat classification properly: EMT vs ART implications, issuer transparency checks, listing governance, and risk disclosure logic aligned with the role you play (platform, custodian, distributor, issuer). We avoid absolute statements like “always requires X licence” and instead document the decision logic.
Supervisory Dialogue and Deficiency Management
In France, progress is iterative. What matters is response quality: direct answers, operational evidence, and remediation plans with ownership and testing logic — not legal verbosity.
A strong operating model assumes retrospective review: any onboarding decision, alert outcome, override, incident judgement, or escalation should be reconstructible months later from records, not from staff recollection.
Enforcement Risk Patterns We Design Against
Systemic weaknesses, not clerical mistakes, drive escalation. Typical triggers include:
inconsistent EDD and weak source-of-funds logic
alert backlogs or non-auditable investigations
unclear accountability between compliance, tech, and operations
outsourcing chains that reduce auditability
repeated incidents without structural remediation
token/service misclassification and uncontrolled product drift
The most persuasive defence is an evidence trail: logs, minutes, testing outputs, and tracked remediation.
Request a Crypto Licensing Assessment
Banking and Fiat Rails in France: Designing for Acceptance, Not Hope
Why banking is the real bottleneck
In France, PSAN registration is a necessary condition for lawful operation, but it is rarely a sufficient condition for stable fiat access. Banks and payment institutions apply their own de-risking logic, which is influenced by correspondent banking constraints, internal appetite, sector-wide risk posture, and the credibility of the applicant’s control environment. A PSAN file that passes registration may still fail banking onboarding if it cannot demonstrate operational discipline, transparent fund-flow logic, and enforceable AML controls at the level banks expect.
The practical implication is that banking readiness must be engineered as part of the licensing programme, not handled as a post-registration “business development” task. If banking becomes an afterthought, the firm typically resorts to patchwork solutions: unstable payment providers, fragmented flows, inconsistent narratives, and operational behaviours that later undermine supervisory confidence.
Our approach treats banking as an evidence and design problem. We structure the bank-facing onboarding pack to mirror the regulatory narrative, but written in banking-risk language: how money enters, how it is controlled, how it is reconciled, and how anomalies are investigated. This prevents a common failure pattern where a firm presents one story to regulators and a different story to banks.
Flow-of-funds architecture that withstands scrutiny
Banking acceptance in France is heavily driven by whether the bank can reconstruct the movement of funds end-to-end and understand what triggers controls. “We do crypto” is not a narrative. A bank wants a traceable model:
client onboarding and acceptance logic
funding sources and permitted rails
conversion points between fiat and crypto
settlement logic (instant vs batch, internal ledger vs external settlement)
segregation between client money and operating money
withdrawal governance and exception handling
reconciliation and ledger integrity
A credible flow-of-funds architecture includes diagrammed flows, written control points, and evidence outputs. It does not rely on vague statements such as “segregated accounts exist” without showing how segregation is enforced operationally. For exchange or broker models, special attention is needed for spreads, fees, and revenue recognition because banks will ask where the firm profits and how it prevents hidden value transfer.
Source-of-wealth and beneficial owner credibility
For banking in France, beneficial owner transparency is not an abstract governance element. It is a gatekeeping variable. Banks typically test whether the firm can produce consistent, fact-based source-of-wealth narratives for key owners and controllers, especially where owners are international, have complex holdings, or operate in adjacent high-risk sectors.
A weak pattern is relying on static owner declarations without structured evidence logic. A strong pattern is documenting the risk-based decision logic: what level of SoW/SoF depth is applied for owners, when it is refreshed, what triggers escalation, and how discrepancies are resolved.
The key is consistency: ownership and SoW logic must align across the PSAN narrative, internal AML procedures, and bank onboarding responses. Inconsistency is interpreted as lack of control ownership, not as an administrative mismatch.
Payment provider strategy and concentration risk
A single-rail dependency is fragile. Many crypto businesses build around one bank account or one PSP relationship and discover later that operational stability depends on a counterparty they cannot control. In France, concentration risk is both a banking concern and a supervisory concern when it threatens continuity of service and client protection.
A resilient strategy typically separates:
client intake rails from treasury rails
operational revenue accounts from client pass-through accounts (where relevant)
primary and fallback payment routes
high-risk merchant exposure from core client funding flows
These design decisions must remain consistent with the authorised perimeter and client disclosures. “Shadow rails” that are used operationally but not reflected in documentation create long-term fragility and supervisory exposure.
Bank-facing evidence pack: what actually works
A bank onboarding pack should not be a pile of policies. It should be a structured dossier that answers banking questions in their own order:
corporate profile and operating geography
regulated status and supervisory posture
services provided, client types, target markets
AML governance (who can block activity, how escalation works)
onboarding and monitoring methodology, with examples of evidence outputs
transaction monitoring and investigation lifecycle
sanctions screening approach and quality controls
Travel Rule capability as a process, not as marketing
custody model (if any), segregation, reconciliation, incident logic
data governance, access control, and auditability
incident history handling and remediation discipline
flow-of-funds maps and reconciliation cadence
counterparties: liquidity providers, custodians, key vendors, critical sub-providers
contingency planning and exit logic for critical dependencies
Banks care about clarity, not legal rhetoric. Over-argumentation tends to increase suspicion. Operational detail, explained plainly, tends to reduce it.
Supervisory Dialogue in France: Response Engineering and Deficiency Closure
Registration and authorisation as an iterative process
In France, supervisory progress is rarely linear. The file moves through questions, clarifications, deficiency notices, and iterative document refinement. The difference between a stalled file and a progressing file is often not the initial submission but the quality of response engineering.
Regulators typically test whether a firm:
understands its own operating model
can explain decisions without contradictions
can provide evidence rather than assurances
can remediate structural issues rather than argue them away
keeps a controlled version history across the pack
A common mistake is treating each query as a stand-alone exchange. A more successful approach treats the dialogue as a controlled system: each regulator comment is mapped to specific document changes, evidence additions, and updated implementation plans — with consistent cross-references across governance, AML, ICT, and client-facing materials.
How to answer without creating new problems
Responses that “sound good” often create unintended scope expansion. For example, stating “we will monitor X” can be interpreted as a commitment that must be implemented and evidenced. If X is not truly required or not operationally feasible, the firm creates a future failure point.
High-quality responses therefore follow three principles:
answer the question directly, in operational terms
commit only to controls that are feasible and testable
provide evidence artefacts or a concrete remediation plan with ownership and testing logic
Where regulators identify ambiguity, they are usually asking for one of three things: a clearer perimeter, stronger evidence, or a more realistic operating explanation. The fastest route is not more text; it is more coherence.
Deficiency closure discipline
Deficiency notices are often manageable if the firm treats them as a structured remediation programme. A credible closure approach includes:
deficiency register: each point, owner, action, deadline
remediation artefact list: what will be produced (policy update, workflow change, evidence log, training)
testing method: how effectiveness will be verified
board/management sign-off: evidence that the firm owns the remediation
version control: traceability between old and updated sections
Regulators often look favourably on firms that acknowledge issues and implement structural fixes quickly. The opposite — denial, minimisation, or cosmetic edits — increases scrutiny.
Evidence design for retrospective reconstruction
French supervision is evidence-driven: supervisors assume retrospective review. Any onboarding decision, override, escalation, suspicious reporting decision, incident classification judgement, or product perimeter decision may be reviewed long after the fact. The test is whether the decision can be reconstructed without relying on memory.
This pushes firms toward systems thinking:
logs are time-stamped, attributable, and consistent across tools
manual overrides are justified and reviewed
investigation files include reasoning, not only outcomes
approvals are documented and tied to decision rights
remediation actions are tracked to closure
If a firm cannot reconstruct decisions, supervisors often treat that as equivalent to not having controls.
Escalation mechanics that actually work
Many firms have escalation charts. The question is whether escalations happen. Supervisors frequently detect “paper escalations” through behavioural signals: recurring anomalies without escalation records, decisions made by commercial staff without compliance involvement, or incidents handled informally without documentation.
A defensible escalation model defines:
mandatory escalation triggers (not optional)
who can pause onboarding, restrict withdrawals, halt certain services
how disagreements between business and compliance are resolved
what documentation is required for escalation closure
how management receives and acts on escalations
The purpose is not bureaucracy. The purpose is to demonstrate that risk ownership exists and that the compliance function is empowered.
Product Perimeter Control: Preventing Regulatory Drift as the Platform Evolves
Why perimeter control is a primary survival system
Crypto businesses evolve continuously. Tokens change. Features expand. New jurisdictions become commercially attractive. Integrations multiply. The fastest way to fall out of regulatory alignment is not a deliberate breach — it is gradual drift.
French supervision expects the firm to treat perimeter control as an ongoing governance function. This means changes are assessed before they are implemented, not explained after they are live.
Perimeter drift is especially common in:
adding new tokens with unclear classification
introducing yield-like features or rewards programmes
expanding into new client segments (retail → professional/institutional)
enabling new transfer types (unhosted wallets, cross-chain, DeFi access)
adding custody-like capabilities through technical control
modifying fee structures and execution logic in a way that changes the product character
A mature platform uses a structured change governance process that triggers regulatory assessment automatically when change proposals hit certain criteria.
Asset listing governance that survives scrutiny
For platforms that list multiple assets, listing governance is not a marketing or product decision. It is a compliance and conduct decision. A defensible listing process typically includes:
initial asset due diligence: technology, governance, liquidity, manipulation risk
legal classification logic and documentation
AML risk review: exposure to mixers, scam typologies, sanctions risk indicators
disclosure review: ensuring client-facing risk language matches the asset risk profile
approval by defined committee/decision rights
post-listing monitoring: triggers for delisting, restrictions, enhanced monitoring
Supervisors often judge firms by their willingness to restrict or delist when risk increases. “We list what the market wants” is not a defensible posture. “We list what we can supervise” is.
Managing stablecoins and role-specific exposure
Stablecoins introduce classification and disclosure complexity. A robust posture avoids absolute statements and instead documents the role logic:
are you merely listing, or facilitating issuance/distribution?
do you hold client fiat, or only crypto?
does the stablecoin interact with payment-like features?
how are reserve risks disclosed and monitored?
what triggers enhanced scrutiny or restrictions?
The key for France is not to treat stablecoins as a “single bucket.” The risk narrative differs materially across assets, and disclosure must reflect that.
Unhosted wallets and enhanced controls
Unhosted wallet interaction is often where AML frameworks break. Supervisors do not necessarily require uniform hard bans, but they expect clear decision logic and operational enforceability:
when unhosted withdrawals are permitted
what verification or risk checks apply
what thresholds trigger enhanced review
how suspicious patterns are escalated and documented
how exceptions are handled without informal workarounds
Controls must balance operational feasibility with risk appetite. The worst position is to claim strict controls and then operate informally.
DeFi exposure and responsibility boundaries
Where a platform provides access to DeFi protocols or liquidity aggregation, the compliance question becomes: what control does the firm exercise, and what client expectations does it create?
A defensible approach:
defines whether access is execution, routing, or merely informational
documents responsibility boundaries in client terms
assesses smart contract and protocol risk
updates disclosures to reflect failure modes and user risk
ensures AML monitoring can still interpret flows
If responsibility boundaries are unclear, supervisors often treat that as a governance problem.
Change governance: the “pre-launch” discipline
A mature change governance process typically includes:
regulatory classification check
AML impact analysis
custody and operational risk review
client disclosure and marketing review
governance approval (committee/board where relevant)
implementation plan with evidence outputs
post-launch monitoring plan and contingency actions
This turns innovation into a controlled process rather than a source of surprise. France does not prohibit innovation; it penalises uncontrolled change that increases customer risk or undermines auditability.
Outsourcing Chains, Fourth-Party Risk, and Auditability Under French Expectations
Outsourcing does not outsource responsibility
Many PSANs rely on layered outsourcing: cloud infrastructure, analytics tools, KYC vendors, custody technology, customer support platforms, and incident response providers. French expectations apply not only to direct vendors but also to critical sub-providers where failure would impair compliance or client protection.
Supervisory focus is practical:
can you explain the dependency chain?
can you access logs and evidence?
do contracts preserve audit and access rights?
can you exit without service collapse?
does outsourcing reduce your control, or strengthen it?
A weak outsourcing posture is one where operational control becomes invisible behind vendors. A strong posture is one where the firm can demonstrate oversight and accountability even with outsourced execution.
Contract standards that reduce supervisory friction
Contracts should be written to preserve:
scope clarity and performance expectations
incident notification and cooperation obligations
audit rights and regulatory access support
data protection, confidentiality, and retention duties
change notification and approval mechanisms
termination and exit support, including data return and migration assistance
Where critical functions are outsourced, the firm should be able to show that it can continue operating if the vendor fails — not instantly, but through a credible transition plan.
Data flow mapping and cross-border implications
Data flows are not just GDPR formalities. In a crypto operating model, data flows define auditability: where logs exist, how quickly evidence can be retrieved, and who can access it.
A defensible model includes:
mapping of personal data and operational data stores
clarity on where monitoring data is processed and retained
access controls and privileged access logging
retention rules that align with AML requirements
realistic handling of data subject requests without compromising AML recordkeeping
Supervisors typically do not demand data localisation as an ideology. They demand transparency and control.
Vendor oversight as an ongoing function
Due diligence is not a one-off. Mature firms implement:
periodic reassessment and risk scoring of vendors
performance and incident trend review
verification that contractual obligations remain fit for purpose
testing of exit plans, at least table-top or partial migrations for critical systems
Exit planning is often the weakest point. Without it, vendor failure becomes a regulated incident that can force service restriction or withdrawal limitation, which then triggers both supervisory and reputational damage.
Operating Under MiCA Transition: Building a Controlled Migration Without Breaking the Business
The transition must be treated as a programme, not a promise
For France-based firms, MiCA defines the EU end-state: CASP authorisation with EU-wide passporting mechanics. The practical risk is treating PSAN as “good enough” and postponing MiCA readiness until the transition window is almost over. That approach typically forces rushed remediation, hurried documentation changes, and increased supervisory friction.
A controlled transition approach:
defines target CASP perimeter early
assesses gaps between PSAN operating model and MiCA expectations
upgrades governance and ICT controls in a scalable manner
aligns client documentation and marketing discipline with the higher standard
builds prudential planning and sustainability narratives that can withstand EU-grade scrutiny
Avoiding dual-system chaos
A common failure pattern during transition is running two incompatible operating narratives:
PSAN narrative for France
MiCA narrative for future EU scale
If those narratives diverge, internal teams behave inconsistently, evidence trails fragment, and external counterparties (banks, payment partners, institutional clients) lose confidence.
The correct approach is to treat PSAN as the base layer and build MiCA readiness as structured enhancements that remain consistent with current operations. The firm should not “pretend” it is already a MiCA CASP, but it should design controls so they will not need to be rebuilt later.
Prudential credibility without over-claiming
Even where PSAN is framed as a registration route, supervisory and counterparty expectations increasingly resemble prudential thinking:
sustainable financial planning
realistic cost modelling for compliance and security
liquidity and contingency logic for stress events
governance oversight of treasury behaviour and conflict risks
The key is presentation discipline: internal prudential tools should be positioned as governance instruments, not as imported banking obligations. The goal is to demonstrate that the firm will not collapse under compliance cost or operational stress.
Enforcement Resilience: What Keeps Firms Alive When Issues Occur
Regulators sanction patterns, not accidents
In France, the most dangerous condition is not the existence of incidents; it is repeated incidents without structural improvement, or evidence of avoidance and undocumented workarounds.
A resilient firm demonstrates:
rapid identification of issues
root-cause analysis
clear ownership for remediation
testing of remediation effectiveness
documented closure and follow-up
transparent supervisory engagement where necessary
Incident classification and judgement discipline
Not every incident requires notification, but every incident requires a documented classification decision. Supervisors are often more concerned by undocumented judgement than by the event itself.
A robust incident discipline includes:
severity criteria and client impact assessment
decision rights: who determines materiality
internal escalation requirements
client communication thresholds
remediation and post-incident testing
evidence retention and audit trails
Cultural signals regulators notice
Culture is observed through behaviour:
are staff empowered to escalate, or afraid?
do exceptions get documented or hidden?
does compliance block when needed?
does management follow through on remediation?
A culture that protects short-term growth at the expense of control integrity becomes visible in evidence trails. A culture that prioritises traceability, escalation, and structured remediation tends to preserve credibility even when problems occur.
Operating Evidence, Audit Trails, and Inspection Readiness in France
Why evidence quality decides outcomes
Under the French PSAN regime, the decisive factor is rarely whether a policy exists. It is whether the firm can prove how decisions were made, who made them, and what happened next. Supervisory reviews consistently test retrospective reconstruction: can an independent reviewer understand an onboarding decision, an alert outcome, or an incident response without relying on staff explanations?
Evidence quality therefore becomes a structural control. Firms that design evidence as an afterthought usually discover gaps only when questioned by supervisors or banks. Firms that design evidence flows intentionally tend to progress faster and with fewer escalation cycles.
A defensible evidence architecture treats logs, approvals, investigations, and remediation records as first-class operational artefacts. They are not “supporting documents”; they are the control itself.
Designing evidence flows across the lifecycle
A robust operating model defines evidence at each stage of the client and transaction lifecycle.
Onboarding evidence typically includes identity verification outputs, beneficial ownership analysis, risk classification rationale, EDD artefacts where applicable, and approval records showing who authorised acceptance and under what conditions.
Ongoing monitoring evidence captures alerts, investigation notes, supporting data extracts, decision rationale, escalation records, and closure approvals. The emphasis is not on volume but on traceability: why was this alert generated, how was it assessed, and why was it closed or reported?
Incident and exception evidence records detection time, impact assessment, decision authority, actions taken, client communication where relevant, and remediation steps. Supervisors expect this trail even when incidents are ultimately classified as non-material.
Audit trails as a governance instrument
Audit trails are not merely technical logs. They are governance instruments that demonstrate control ownership.
A mature setup ensures that:
decisions are attributable to defined roles
timestamps are consistent across systems
versioning allows reconstruction of what policy or rule applied at the time
overrides are justified and reviewed
follow-up actions are tracked to completion
Where audit trails are fragmented across tools, the firm should still be able to reconstruct a coherent narrative. Inability to do so is often interpreted as a governance weakness, not a tooling issue.
Internal Controls Beyond AML: Financial, Operational, and Conduct Controls
Financial controls as supervisory signals
Even under a registration-based regime, French supervisors increasingly observe financial control maturity as a proxy for organisational stability. Weak financial controls often correlate with weak AML and operational discipline.
A credible financial control framework includes segregation of duties, authorisation thresholds, reconciliation routines, and review mechanisms that prevent single-person dominance over critical processes. This applies not only to fiat flows but also to crypto treasury operations.
Where proprietary trading or liquidity provision exists, boundaries must be explicit. Supervisors pay attention to whether treasury behaviour could conflict with client interests or distort market conduct.
Operational controls and error prevention
Operational errors become regulatory issues when they repeat or remain undocumented. A strong operating model defines:
standard operating procedures for critical actions
maker-checker logic where feasible
compensating controls where segregation is limited
escalation for deviations and exceptions
Error logs and corrective actions should feed back into control design. Repeated “human error” without structural change is treated as a governance failure rather than an operational mishap.
Conduct controls and behavioural risk
France places increasing emphasis on conduct. Even outside classical securities law, expectations around fairness, transparency, and integrity apply.
Conduct controls typically cover:
employee trading restrictions and disclosures
handling of inside or non-public information
conflict identification and mitigation
disciplinary processes and enforcement
The presence of a code of conduct is not decisive. What matters is enforcement: evidence that breaches are identified, addressed, and resolved consistently.
Client Segmentation and Risk-Differentiated Controls
Why segmentation matters
One-size-fits-all controls rarely survive scale. As client bases diversify, risks multiply. Retail users, professional traders, corporate clients, and institutional counterparties each introduce different vectors of AML, operational, and conduct risk.
French supervisors expect controls to evolve accordingly. Failure to segment clients appropriately is often cited as a root cause of ineffective monitoring and weak disclosures.
Segmentation in onboarding and monitoring
A defensible segmentation framework defines:
client categories and eligibility criteria
onboarding depth per segment
EDD triggers aligned to segment risk
monitoring intensity and alert thresholds
disclosure standards tailored to sophistication
Segmentation decisions must be documented. Supervisors will test whether the firm understands why a client belongs in a given category and how that classification affects controls.
Disclosure and suitability considerations
Even where formal suitability rules do not apply, France expects proportional risk communication. Disclosures that are adequate for professionals may be misleading for retail users.
A mature model differentiates:
language complexity
risk emphasis
product warnings
marketing channels
Inconsistency between segmentation logic and disclosure practice is treated as conduct risk.
Marketing Governance and Public Communications Discipline
Marketing as a regulated surface
In France, marketing is not peripheral. Public statements, website content, social media messaging, and influencer activity are all potential supervisory touchpoints.
Regulators pay attention when marketing language contradicts internal risk assessments or regulatory filings. Claims about safety, compliance status, or performance are scrutinised against operational reality.
Marketing approval workflows
A defensible framework ensures that:
marketing materials are reviewed before publication
compliance has veto power over misleading claims
updates are tracked and versioned
withdrawn or corrected materials are archived
This applies equally to third-party marketing, including affiliates and influencers. Outsourcing promotion does not outsource responsibility.
Reputation risk and enforcement exposure
French enforcement actions are often public. Reputational impact frequently exceeds financial penalties. Firms that proactively manage marketing discipline reduce the risk of supervisory escalation triggered by public perception rather than operational failure.
Human Capital, Training, and Control Sustainability
Staffing as a control variable
Supervisors assess whether staffing levels and competencies match operational complexity. Under-resourced compliance or IT security functions are common findings.
A credible staffing model includes role definitions, access mapping, and succession planning for critical positions. Reliance on single individuals without backup is treated as fragility.
Training as evidence, not ceremony
Training programmes must be relevant, periodic, and evidenced. Completion records, testing results, and content updates matter.
Supervisors often examine whether training reflects real risks the firm faces, not generic AML slides. Training that evolves with the business signals maturity.
Managing staff turnover
Turnover is inevitable. Control degradation is not.
Resilient firms implement structured handovers, role-based documentation, and access revocation discipline. Loss of institutional memory is a recognised supervisory risk.
Treasury, Liquidity, and Stress Management
Treasury governance expectations
Even where firms do not hold client fiat, treasury behaviour influences operational stability. Supervisors expect clarity on:
permissible assets
exposure limits
liquidity buffers
authorisation thresholds
Uncontrolled treasury activity can undermine safeguarding and conduct obligations.
Stress scenarios and resilience
Stress testing does not need to mirror banking frameworks, but it should be realistic. Firms should understand how they would respond to:
sudden volume spikes
banking interruptions
major market volatility
security incidents
Documented stress responses and contingency plans increase supervisory confidence.
Record Retention, Data Integrity, and Legal Defensibility
Record retention as a compliance backbone
French expectations around record retention extend beyond minimum legal periods. Records must remain accessible, intelligible, and protected against tampering.
Retention policies should align AML, accounting, and operational needs. Conflicts between data protection and AML retention must be resolved through documented legal analysis.
Integrity and immutability
Supervisors increasingly test whether records can be altered retrospectively. Systems should prevent unauthorised modification and log any permitted changes.
Where manual records exist, controls must ensure authenticity and completeness.
Managing Cross-Border Exposure and Jurisdictional Risk
Cross-border clients and services
Even domestically focused PSANs attract international users. This introduces additional AML, sanctions, and regulatory exposure.
A defensible approach includes:
geographic risk mapping
jurisdiction-specific restrictions
enhanced monitoring for higher-risk regions
documented acceptance rationale
Silence on cross-border exposure is interpreted as lack of awareness.
Cooperation with foreign authorities
Firms must be prepared to cooperate with foreign regulators where legally required. Clear internal procedures for handling requests reduce operational stress and legal risk.
Preparing for Supervisory Inspections and Thematic Reviews
Inspection readiness as a steady state
Inspections are not exceptional events. Firms that scramble at inspection time often reveal deeper weaknesses.
Inspection-ready organisations maintain:
centralised documentation repositories
clear ownership of regulatory responses
trained staff who understand inspection conduct
rapid evidence retrieval capability
Thematic reviews and peer benchmarking
Regulators conduct thematic reviews across multiple firms. Prepared firms track sector-wide enforcement trends and assess relevance to their own controls.
Ignoring peer enforcement outcomes is often interpreted as complacency.
Long-Term Compliance Economics and Strategic Positioning
Compliance as an operating cost, not a shock
Sustainable firms plan for compliance costs realistically. Under-budgeting for AML, security, and governance often leads to shortcuts that later trigger enforcement.
A credible financial narrative shows how compliance is funded over time without compromising operations.
Compliance as a growth enabler
In France, strong compliance increasingly functions as a competitive advantage. Firms with mature controls enjoy:
smoother supervisory relationships
more stable banking access
lower enforcement volatility
higher institutional trust
This positioning aligns naturally with MiCA’s direction and supports long-term scalability.
Closing Integration Note
This additional layer reinforces the core message of the France page: regulatory success is cumulative. It is built through coherence, evidence discipline, and behavioural consistency over time. Registration or authorisation opens the door, but operational credibility keeps it open.
FAQ
The PSAN Registration was the French national baseline, primarily focused on AML/CFT compliance and limited to operating within France. The CASP Authorization is the new, definitive, full European license established by MiCA Regulation. It demands higher capital, comprehensive organizational and technical resilience (DORA/NIS2), and critically, grants MiCA Passporting rights across the entire EEA.
If your firm relied on the Pre-MiCA PSAN Grandfathering mechanism, the grace period is now effectively over. You were required to have submitted a full CASP Authorization application to the AMF by the final deadline to legally continue operating. Firms operating solely on the old PSAN Registration are now highly restricted or subject to regulatory action, as the national regime has been superseded.
The process is coordinated between two main bodies, reflecting France's dual oversight:
The AMF (Autorité des marchés financiers) grants the final AMF Crypto License (the CASP Authorization) after assessing the business model, governance, and organizational requirements.
The ACPR (Autorité de contrôle prudentiel et de résolution) handles the mandatory AML/CFT component, specifically reviewing the Audit of French Crypto AML Protocols.
This is a mandatory independent audit required under the CASP framework (and the EU's DORA) to prove that the VASP’s distributed ledger technology (DLT) platform can withstand severe technical and security failures. The testing ensures:
Secure key revocation (MPC/multi-sig failure).
System integrity during blockchain forks or high congestion.
The Business Continuity Plan (BCP) is fully functional, minimizing client access downtime.
The system must utilize advanced RegTech (AI/ML) to score and flag transactions in real-time. Crucially, it must be capable of:
Identifying subtle patterns of structuring (breaking up large transfers into small ones).
Screening non-custodial wallet addresses against global sanctions lists.
Demonstrating a clear, auditable trail to the ACPR of why a transaction was flagged or cleared.
They require the VASP to adopt institutional-grade cyber defense. Key requirements include:
Mandatory use of zero-trust network architecture.
Annual third-party security audits (IT System Risk Assessment PSAN).
A formal Incident Response Team capable of reporting major breaches to the AMF/ACPR within tight, prescribed deadlines (often 4 hours).
It is a deep due diligence process on all Ultimate Beneficial Owners (UBOs) and Key Persons (Directors, MLROs). The AMF verifies:
Honourability: No history of financial crime or misconduct.
Competence: Relevant professional experience in finance, technology, or regulation.
Financial Soundness: The legitimate Source of Wealth (SoW) for all capital invested in the VASP.
The cost is substantial due to compliance requirements, not just fees. While AMF application fees range from €10k to €30k, the total projected cost (excluding the minimum capital requirement) is primarily driven by:
Legal & Advisory: €80,000 – €200,000 for application preparation.
Technical Audits: €25,000 – €50,000 for DLT and IT system validation.
PII: The mandatory Professional Indemnity Insurance for CASP, which can cost €30,000 – €80,000 annually based on Assets Under Management (AUM).
It acts as a primary form of consumer protection under MiCA. The insurance must cover client losses resulting from VASP operational errors, negligence, internal fraud, and failures in key management (e.g., loss of private keys), ensuring that clients are protected even if the VASP suffers a critical security lapse.
The CASP Authorization grants the right (the "passport") to offer the licensed services in any other EEA member state. The VASP must:
Formally notify the AMF of its intent to use the passport in specific countries.
Adhere to host countries' local Conduct of Business and marketing rules (e.g., language requirements, specific disclosures).
The AMF mandates strict compliance with client protection rules, requiring VASPs to:
Conduct suitability and appropriateness tests for complex services (e.g., leveraged trading).
Provide clear, non-misleading risk warnings.
Maintain organizational measures to prevent and manage conflicts of interest.
Ensure full legal segregation of client crypto-assets from the VASP's proprietary funds.
