
This introduction frames how recent SEC staff FAQs reshape custody and capital rules for digital assets. The updates from May 15, 2025 and December 17, 2025 clarify how broker-dealers meet possession or control tests under Rule 15c3-3 and how capital haircuts apply to bitcoin and ether. The 2019 joint staff statement is withdrawn, narrowing guidance to the FAQ framework.
This Ultimate Guide explains who must meet these rules and why examiners now test continuous control evidence. You will read practical notes on custody, segregation, wallet designs, and how institutions show control when securities exist on-chain.
Expect clear, actionable concepts. We cover how HSM, multisig, and bank sub-custody models support compliance and reduce operational risk. The guide also previews capital treatment that can affect market-making economics and how firms should align controls to examiner expectations.
Understanding how direct key control maps to legal custody is essential for firms handling on-chain assets.
Direct key control means an entity holds the private keys and signs transactions itself. Third-party custody means another firm holds keys or access on your behalf and accepts responsibility for protection.
For US law, control is both legal and operational. For crypto asset securities, the SEC’s FAQs tie control to demonstrable signing or directive authority on the blockchain.
Holding keys improves operational control but raises security and governance needs. Firms must document key ceremonies, recovery plans, and approvals to avoid single points of failure.
| Model | Who holds keys | Regulatory fit |
|---|---|---|
| Broker HSM | Broker-dealer HSM | Can evidence control for on-chain securities |
| Bank sub-custody | Bank with directive rights | Strong examiner comfort when contracts align |
| Multisig | Distributed signers with governance | Permits demonstrable authority if properly governed |
Compliance officers, operations leads, general counsel, and tech teams will use this guide to convert SEC staff FAQs into actionable policies. It focuses on practical tasks, not academic theory.
Institutions and firms that run broker‑dealer desks, bank sub‑custody, or market-making support for ETF in‑kind flows will find targeted advice. Risk and security teams get checklists for incident playbooks and segregation.
Trading desks and authorized participants need clarity on how custody choices affect capital and trading readiness. Finance and audit will get steps to reconcile on‑chain activity with books and records.
| Audience | Main focus | Expected outcome |
|---|---|---|
| Compliance | Documentation & examiner readiness | Clear policies that meet audit tests |
| Risk & Security | Segregation & incident response | Reduced operational and cyber risk |
| Trading & Ops | Custody integration for flows | Operational readiness for trading and in-kind activity |
For a practical comparison of custody services, see our custody services comparison to evaluate providers and models.
Key U.S. agencies set distinct expectations for custody, customer protection, and transaction monitoring of digital assets.
The SEC leads on matters that touch securities and the Customer Protection Rule. It tests how broker-dealers show possession or control for crypto asset securities.
FINRA focuses on broker-dealer conduct and exams. Expect evolving checklists for on-chain control evidence and books-and-records systems.
| Agency | Primary focus | Practical impact for firms |
|---|---|---|
| SEC | Securities & customer protection | Must demonstrate possession or control for on‑chain securities |
| FINRA | Broker-dealer exams | Standardized checklists for control evidence and recordkeeping |
| CFTC | Commodities & derivatives | Impacts hedging, margin, and commodity haircut treatment |
| Fed / OCC | Bank supervision | Shapes bank sub-custody programs and supervisory expectations |
| FinCEN / IRS / OFAC | AML/CFT, tax, sanctions | Requires AML controls, reporting systems, and screening for custodians and exchanges |
When tokens qualify as securities, firms must show how possession or control attaches to blockchain keys.
Rule 15c3-3(b) governs how broker-dealers safeguard customer positions, but it does not apply to non-security crypto held by a broker-dealer. That makes correct legal classification essential before applying customer protection processes.
15c3-3(b) targets safeguarding customer securities and cash. Non-security crypto falls outside the rule, so firms need separate guardrails for those holdings.
To meet 15c3-3(c), a broker-dealer must show demonstrable authority to protect and direct movements of on-chain securities. That requires documented controls, signing evidence, and audit trails examiners can test.

Qualifying control locations include BD-held private keys in an HSM, a bank with documented directive rights, or multisig where the broker-dealer’s signing role is provable.
| Control Location | Evidence Required | Practical Strength |
|---|---|---|
| Broker HSM | Key custody logs, signing records, HSM attestations | High: direct cryptographic authority |
| Bank sub-custody | Contractual directive rights, audit trail, access controls | Strong: examiner comfort if contracts align |
| Multisig | Governance docs, signature thresholds, movement logs | Good: effective when governance proves signing authority |
For legal context and exam guidance, see the SEC FAQs memo and a practical compliance overview on how firms meet asset custody requirements.
Broker-dealers now face clearer tests for showing control over crypto assets, driven by the FAQ framework.
The 2019 joint staff statement has been withdrawn, and the FAQ framework is the reference point examiners use to assess custody for securities on-chain.
Firms can no longer lean on SPBD status as a primary safe harbor. The staff accepts multiple control-location models.
That expands options: HSM-held keys, bank sub-custody with documented directive rights, or governed multisig arrangements.
Examiners expect clear documentation of key lifecycles, approval gates, and exception handling.
Key management must show role separation, rotation policies, and incident playbooks tied to operational risk controls.
Systems should log signing actions, directive requests, reconciliations, and on‑chain movements.
Durable audit trails are the decisive evidence that control is real and persistent over time.
| Area | Expectation | Practical example |
|---|---|---|
| Control location | Demonstrable signing authority | HSM logs or bank directive contracts |
| Key governance | Role separation & rotation | Approval thresholds and rotation schedule |
| Audit trail | Persistent, reconciled records | Signed transactions, reconciliation reports |
Broker-dealers may treat proprietary bitcoin and ether as “readily marketable” for net capital if they meet the staff’s posture. That allows application of Rule 15c3-1 Appendix B’s 20% commodity haircut to BTC/ETH positions.
Capital impact is straightforward: a 20% haircut reduces net capital by a portion of inventory value. For example, a $50 million average intraday BTC/ETH inventory implies roughly a $10 million deduction. That deduction affects trading capacity and intraday risk limits.

Custody and settlement setups must match trading requirements to avoid delays in creation/redemption cycles. Faster movement and clear control evidence reduce settlement friction.
Operational readiness includes secure asset movement for in‑kind baskets plus reconciled records showing availability of positions for ETP activity. Coordination between trading, custody, and compliance teams is critical.
| Area | Impact | Action |
|---|---|---|
| Inventory size | Higher haircut increases capital charge | Right‑size positions; prefer lower inventory or hedges |
| Workflow choice | Cash vs in‑kind economics change | Model spreads, capital cost, and settlement risk |
| Custody alignment | Settlement speed and control evidence matter | Ensure custody supports quick, auditable transfers |
| Reporting | Regulatory and finance reconciliation required | Document haircut application and intraday exposures |
After the Federal Reserve withdrew earlier supervisory letters on April 24, 2025, many broker-dealers found faster, clearer paths to bank partnerships for custody needs.
Bank sub-custody can qualify as a control location when contracts give explicit directive rights and the bank documents execution of instructions. Firms should insist that agreements spell out who may instruct movements and under what conditions.
Contracts must include segregation, reconciliation rules, SLAs for execution, and how keys are handled in the bank environment. Incident playbooks should describe manual directives, escalation steps, and evidence capture so auditors can recreate events.
| Area | Expectation | Practical proof |
|---|---|---|
| Directive rights | Clear contractual authority | Signed agreements and playbooks |
| Execution | Timely, auditable moves | Logs, confirmations, on‑chain links |
| Operational controls | Segregation & reconciliation | SLA reports and reconciled records |
For practical custody contracting tips, see this custody services guidance that institutions may also use when drafting terms.
Institutions that take direct responsibility for on‑chain private keys must meet clear operational and disclosure expectations.
Meeting examiners’ expectations means mapping technical processes into durable policy and audit evidence. Firms should show who can sign, how signing happens, and how movements tie to books and records.

When a broker‑dealer holds non‑security crypto for customers, it must disclose which protections apply and which do not. Make clear that Rule 15c3-3(b) customer protections do not cover these holdings.
Withdrawal procedures should ensure only authorized personnel trigger transfers, with logs linking approvals, keys used, and the on‑chain outcome.
| Area | Expectation | Practical proof |
|---|---|---|
| Controls | Role separation & dual approvals | Approval logs, access lists |
| Disclosure | Clear retail notices on protections | Customer notices, onboarding prompts |
| Withdrawal | Authorized triggers & reconciliation | Signed directives, on‑chain links |
Institutional teams weigh control, insurance, and auditability when picking a custody model for digital assets. The choice affects who holds signing authority, who bears recovery responsibility, and how fast withdrawals occur.
Direct control gives institutions immediate withdrawal ability and full operational flexibility.
That freedom concentrates responsibility for private keys, backups, and error prevention on internal teams. Mistakes can cause irreversible loss, so tight procedures and recovery plans are essential.
Qualified custodians deliver insured cold storage, SOC audits, and policy‑based access controls. They shift many operational tasks to a regulated custodian and simplify compliance reporting.
| Approach | Strength | Evidence |
|---|---|---|
| In‑house control | Fast withdrawal; full control | Key ceremonies, incident playbooks |
| Qualified custodian | Insurance, audits, SLA-backed services | SOC reports, insurance certificates |
| Hybrid model | Liquidity with layered protections | Segregation rules, reconciled holdings |
Many institutions keep liquid trading balances in-house and place long-term holdings with a custodian. This balances security, trust, and operational cost.
Decisions should map to liquidity needs, business continuity plans, and examiner expectations for evidence and control.
Choose architectures that create verifiable signing authority and persistent audit trails. Examiners look for technical evidence that links approvals to on‑chain outcomes. That means selecting tech that shows who approved a move, when it happened, and how signatures were generated.
Hardware Security Modules (HSMs) centralize key material in a tamper-resistant appliance. They produce signed directives and immutable logs that map signing events to business approvals.
HSMs support policy-enforced signing and provide cryptographic proof examiners can test against books and records.
Two-of-three multisig spreads authority across parties and reduces single‑point failures. It also documents quorum rules and signer identities.
Well-written governance binds threshold settings to approval workflows and recovery steps. That combination helps show sustained control of digital assets.
Multi‑party computation (MPC) splits private keys into shares so no full key is ever reconstructed. MPC enables role-based policies, comprehensive logs, and scalable operations without central key exposure.
When paired with systems that link directive requests to blockchain transactions, MPC wallets offer an auditable path to demonstrate control and operational ability.
| Approach | Strength | Evidence |
|---|---|---|
| HSM | Strong isolation | Signed directives, HSM attestations |
| 2-of-3 multisig | Resilience & governance | Quorum logs, signer IDs |
| MPC wallets | No single key, scalable | Share logs, policy-enforced approvals |
Practical audit evidence must link signing events to on‑chain movements and the people who approved them. Examiners look for an unbroken trail that converts technical events into legal proof.
Document who requested a transfer, who authorized it, and which cryptographic key produced the signature. Retain signed directives, HSM or wallet logs, and on‑chain transaction IDs together in one records system.
Map authorization thresholds, exception handling, and reconciliations to expected checklist items. Run periodic tests so the system keeps producing consistent evidence over time.
| Evidence Type | What to retain | Examiner use |
|---|---|---|
| Directive records | Signed emails, change tickets, approval IDs | Shows who authorized movements |
| Movement logs | HSM/wallet logs, signer IDs, TX hashes | Links approval to on‑chain outcome |
| Reconciliations | Daily reports, GL ties, exception notes | Demonstrates ongoing accuracy over time |
Effective risk programs assume compromises will happen and focus on limiting harm. Recent exchange failures highlight that moving control in‑house reduces counterparty risk but increases demands on security and operations.
Segregation matters. Split holdings across hot, warm, and cold environments to shrink the blast radius. Keep operational balances minimal and map each environment to clear approval rules.
Access controls must enforce least privilege and multi-person approvals for high-risk operations. Monitor signing events and alert on anomalous flows to reduce theft risk.
Incident response playbooks should include steps for key compromise, operational failure, and suspected fraud. Predefine containment, communication, and recovery actions so teams act quickly under pressure.

| Area | Control | Practical proof |
|---|---|---|
| Segregation of holdings | Hot/warm/cold split with written thresholds | Inventory reports, vault manifests, SLAs |
| Access & approvals | Least privilege, dual-sign, MFA, logging | Approval logs, audit trails, signer IDs |
| Incident response | Compromise playbook; communications plan | Runbook, incident reports, post‑mortem |
| Testing | Tabletop & simulated attacks | Exercise logs, remediation timelines |
Inventory policy should define what stays online for operations versus cold storage. That balance guides availability and exposure decisions and supports examiner and auditor review.
Institutions deploy four practical models to convert custody theory into repeatable operations.
Direct key control via HSMs or governed multisig gives fast operational ability and clear signing logs. This model produces strong evidence of control but requires mature governance, monitoring, and audit capabilities.
Placing assets with a bank that accepts directive rights makes the bank the control location while the broker-dealer keeps operational direction. Contracts, SLAs, and incident playbooks are essential to prove who instructed movements.
Specialist custodians wrapped by a bank or trust combine tooling and supervisory oversight. This solution reduces internal burden while still allowing firms to show reconciled custody and verified flows.
On-chain escrow tied to a transfer agent uses blockchain logic to enforce corporate actions and settlement steps for securities. It can automate flows while keeping verifiable records for examiners.
| Approach | Strength | Evidence |
|---|---|---|
| Broker HSM / Multisig | Direct control; fast moves | Signing logs, key ceremonies |
| Bank sub-custody | Examiner comfort; contractual backup | Directive records, SLAs |
| Custodian tech (bank/trust) | Specialist tooling; oversight | SOC reports, reconciliations |
| Smart-contract escrow | Automated settlement; audit trail | On-chain TXs, transfer-agent co-sign |
Prioritize partners who can prove custody controls, fast execution, and documented recovery plans.
Start by verifying audit posture. Look for SOC 1 or SOC 2 Type II reports and clear attestations of the range of services offered. Confirm insurance limits and insured cold storage coverage that match your asset mix.
Evaluate wallet architecture for policy-enforced withdrawals and layered access that reduce theft risk. Ask how private keys or key shares are stored, rotated, and recovered.
Require evidence of independent audits, multi-signature controls, and insurance schedules. Contracts should state SLAs, audit access, and reporting cadence.
Measure latency for trading workflows and API reliability across hot, warm, and cold paths. Integrated trading options can speed flows but must preserve segregation and approval gates for high-value withdrawal events.
| Criteria | What to check | Why it matters |
|---|---|---|
| Audit & insurance | SOC reports, coverage limits | Examiner comfort; loss protection |
| Wallet design | Policy withdrawals, role access | Limits theft; enforces approvals |
| Trading integration | Latency, APIs, failover | Operational speed and resilience |
Conclusion
Today, US examiners expect designs that combine governance, on‑chain evidence, and clear contracts. Institutions must choose where operational control sits — with in‑house systems, bank sub‑custody, or qualified custodians — and map that choice to durable audit trails. This approach helps firms show control for securities and supports net capital treatment for commodity tokens like BTC and ETH.
Over time, firms, custodians, and exchanges that align tech, legal language, and incident playbooks will reduce the risk of catastrophic failure. Test procedures regularly, refine solutions, and keep records that let examiners and internal teams trust the asset custody story.
It refers to the rules and supervisory expectations that apply when an institution or individual holds and controls private keys or otherwise has direct authority to move digital assets. Agencies such as the SEC, CFTC, FinCEN, OCC and IRS focus on custody, customer protection, anti-money-laundering, tax reporting and safety-of-assets. The term covers custody models, evidence of control, disclosure, and operational controls that reduce theft, loss, or misuse of holdings.
For broker-dealers, control means the firm has the ability to possess or direct disposition of customer property. Under Rule 15c3-3 and related guidance, firms must show they can effect transfers, demonstrate where keys or custodial arrangements are held, and retain documentation and audit trails proving directive authority for on-chain securities and other covered assets.
Institutions must manage cyber risk, operational failures, insider threats, and theft. That means strong access controls, hardware security modules (HSMs) or multisignature designs, thorough incident playbooks, segregation of duties, continuous monitoring, and insured, audited custody practices to protect customer holdings and meet examiner expectations.
Recent SEC FAQs clarified pathways to demonstrate control and reduced reliance on a single institutional checklist. Firms can now rely more on documented directive authority, bank sub-custody contracts, multisig configurations, and technical evidence — provided they maintain strong governance, audit trails, and disclosure. Examiners expect robust documentation and proof of practical control.
Treatment depends on the asset’s characteristics under federal securities law. If an asset qualifies as a security, broker-dealers must follow Rule 15c3-3 customer protection mechanics, including possession or control protocols. Non-security crypto may fall under different supervisory frameworks like commodity or AML rules, so firms need legal analysis and compliance alignment for each asset.
Examiners look for directive authority records, key-management logs, movement histories, chain-of-custody documentation, change-control records, and third-party audit reports. Firms should keep immutable logs showing who approved transactions, where keys reside, and how custody workflows operated during the reporting period.
Yes. Bank sub-custody with clearly drafted directive rights and contractual protections can serve as a control location. Contracts should provide verifiable authority for the broker-dealer to direct transfers, incident response coordination, and examiner access. Examiners evaluate language, operational integration, and history of cooperation.
HSM-backed key stores, enterprise multisignature setups (for example, 2-of-3 with clear governance), and MPC (multi-party computation) wallets are common. The chosen tech must support auditability, segregation of duties, signed directives, and secure key lifecycle management to meet both security and compliance requirements.
Appendix B to Rule 15c3-1 includes haircuts for readily marketable commodities. Firms must apply appropriate inventory haircuts and capital treatments when holding BTC or ETH, which affects market-making and authorized participant activity. Operational practices for ETF in-kind flows and settlement must also align with capital and custody controls.
Qualified custodians offer institutional-grade controls, insurance, audits, and regulatory familiarity, reducing operational burden. In-house key control gives direct withdrawal ability and potential cost savings but increases responsibility for security, compliance, and examiner scrutiny. Many firms adopt hybrid models to balance control and risk.
Broker-dealers and financial firms must clearly disclose custody arrangements, withdrawal rights, custody risk, and whether assets are held with a custodian or the firm. Even for non-securities, transparency on access, insurance, and liability for loss is important to meet customer protection and consumer-finance expectations.
Playbooks must define roles, escalation paths, notification timelines, recovery steps, and proof-of-control procedures. Contracts should assign directive authority, specify audit rights, clarify liability, and include examiner cooperation clauses. Clear, tested procedures increase examiner comfort and reduce response time in theft or outage events.
Multisig is favorable when you need straightforward on-chain signature separation and transparent governance across participants. It suits smaller setups or consortium models. MPC and HSMs offer scalable enterprise features, lower single-point-of-failure risk, and easier integration with off-chain policy enforcement. Choice depends on governance needs, examiner expectations, and operational complexity.
Verify SOC 1/SOC 2 reports, penetration test results, proof of reserves where relevant, policy controls, and the scope of insurance coverage. Check whether insurance covers insider theft, cryptographic compromise, or third-party failures. Confirm how quickly the custodian can produce evidence for an examiner or during an incident.




