Custody is the story examiners read first
When California supervisors evaluate digital asset businesses, custody narratives sit at the center: who holds keys, how customer assets are segregated from corporate property, and what happens when chains fork, contracts upgrade, or partners degrade. DFPI’s public materials emphasize safeguarding customer assets — which means your daily controls must be observable, not implied.
This guide is educational, not legal advice. Confirm obligations against current statutes, rulemakings, and DFPI publications on the Digital Financial Assets resources hub before you change wallet architecture or customer terms.
Start from customer promises in your Terms and UI, then walk backward to wallets and ledgers — examiners frequently use that path during reviews.
Segregation: legal entity, ledger, and wallet layers
Segregation operates on multiple layers. At the legal layer, customer assets should be held or administered consistent with your disclosures and applicable law — often through trust arrangements, qualified custodians, or documented omnibus structures with clear beneficial ownership records. At the ledger layer, sub-accounts must tie to customers without ambiguous pooling that breaks traceability.
At the wallet layer, address management, signing policies, and hot-wallet limits should map to your risk appetite. A common failure mode is technically segregated wallets with operationally shared admin roles — segregation on paper, commingled control in practice.
Reconciliation rhythm: daily is a baseline, not a brag
Daily reconciliation between internal ledgers, wallet balances, and custodian statements is a baseline expectation for many programs — with intraday checks where volumes or volatility warrant. Define tolerances for immaterial differences, investigation SLAs for breaks, and escalation when breaks persist beyond thresholds.
Document how you handle chain-specific quirks: pending confirmations, staking positions, airdrops, and internal transfers between omnibus and withdrawal wallets. Each should have a standard operating procedure so new analysts do not invent ad hoc treatments during month-end crunch.
Sub-custodian and vendor evidence beyond SOC reports
Vendor SOC reports are starting points. Your files should include contractual SLAs, incident notification timelines, proof-of-reserves or attestation scopes where relevant, and your own monitoring outputs — uptime, settlement lag, and exception rates. When vendors change terms, trigger a risk review that updates customer disclosures if material.
For multi-signature or MPC providers, capture key ceremonies, role assignments, and periodic access recertifications. Examiners increasingly ask how you detect insider collusion paths, not only external hackers.
Forks, upgrades, and asset-support decisions
Network upgrades and forks stress custody programs. Predefine governance for supporting new assets, claiming forked value, and communicating customer options. Treasury, legal, and compliance should share a decision log with timestamps — ad hoc Twitter announcements are not a control.
When you delist assets, document wind-down mechanics: customer notices, conversion paths, and reconciliation through final zero balances. Delisting without reconciliation discipline is a frequent source of lingering breaks.
Incident playbooks that preserve evidence
Wallet incidents demand containment without destroying forensic trails. Playbooks should cover key rotation, withdrawal pauses, customer messaging, and preservation of logs across internal systems and vendor portals. After-action reviews should link to ticket IDs and control changes — examiners reward programs that learn in public internally.
Practice partial failures: custodian API degradation, not only total compromise. Partial failures are what operations teams see weekly.
How operators use CompliFi for custody evidence hygiene
Custody programs generate continuous artifacts — reconciliation sign-offs, wallet inventories, policy versions, and vendor due diligence packets. CompliFi keeps those artifacts mapped to DFAL-shaped statutory rows so upgrades to signing tools or custodians do not orphan last quarter’s proof.
Teams on the waitlist are typically replacing shared-drive sprawl with vault naming, review calendars, and workflows that mirror how engineers and compliance leads actually ship changes.
Metrics that make supervision conversations calmer
Track reconciliation break rate, mean time to resolve, hot-wallet utilization vs policy limits, and percentage of customer assets held with each sub-custodian. Trend lines matter more than point-in-time snapshots. When metrics deteriorate, show remediation owners and dates — supervisors understand bad weeks; they resist bad weeks with no response.
Pair metrics with sampling: periodic independent re-performance of reconciliations or wallet attestations. Sampling demonstrates that daily sign-offs are not rubber stamps.
Application narrative: tying controls to customer promises
Your application should explain custody in the same language customers see — then bridge to controls. If marketing promises “instant withdrawals,” show funding and liquidity paths that make that promise credible under stress. Mismatches between UX and control design are supervisory red flags.
Include specimens: redacted reconciliation reports, wallet inventory exports, and org charts for custody operations with named roles and backups.
Omnibus structures and beneficial ownership records
Omnibus wallet models can be efficient when ledger discipline is strong — every customer balance must be identifiable intraday, not only at month-end. Document how deposits are attributed, how internal transfers preserve audit trails, and how you prove no customer is subordinated to another in stress scenarios.
Beneficial ownership and entitlement records should survive employee turnover. Avoid spreadsheets maintained by a single analyst without version control; examiners will ask for historical reconstructions after incidents.
Independent review and periodic control testing
Schedule periodic independent re-performance of reconciliations or targeted wallet attestations. Internal teams doing excellent daily work still benefit from second-line challenge — it demonstrates maturity and catches drift in tolerances or signing policies.
Testing outputs should feed a tracked remediation backlog with due dates, the same way cyber findings do. Closing findings without root-cause fixes guarantees repeat breaks next quarter.
Cyber and physical access intersecting custody
Custody controls fail when laptops holding signing keys share passwords with email accounts. Enforce hardware security modules or MPC policies with break-glass procedures documented and rehearsed. Map every path from compromise to movement of customer assets — then prioritize detections on those paths.
Physical security still matters for hardware wallets and data centers. Visitor logs, camera retention, and shipment controls for HSM installs belong in the same program folder as smart-contract reviews.
DFPI cybersecurity orientation references NIST CSF outcomes; custody engineers should speak the same framework language as security leadership so application narratives do not contradict incident runbooks.
Quarterly, reconcile role-based access for custody operators against HR records — terminated employees with lingering signing rights are a preventable finding category.
What to do this week
Run a reconciliation fire drill on your highest-volume asset, document breaks intentionally injected in a test environment, and verify escalation paths. Update wallet inventories against live deployments — including partner white-label endpoints you might forget in headquarters spreadsheets.
If you want DFAL program modules that keep custody artifacts, cyber evidence, and consumer channels aligned, join the CompliFi waitlist at complifi.co/waitlist — built for California-focused operators who need examiner-ready rhythm without duplicating work across tools.