What you’ll need
- Understanding of policies
- For KYT: Chainalysis account and API credentials
- For travel rule: Notabene integration
Components to configure
KYT/AML screening
Screen transactions for suspicious activity using Chainalysis integration. See the AML/KYT feature overview and Chainalysis setup guide. Screening capabilities:- Pre-screening - Screen outbound transactions before execution
- Post-screening - Analyze incoming transactions
- Risk scoring - Get risk levels for addresses
- Policy integration - Automatically block or require approval for flagged transactions
Audit trails
All operations in Dfns are logged for compliance and audit purposes. See security best practices and the audit logs API. Available audit data:- Transaction history by wallet
- API audit logs for all operations
- Policy triggers and approval decisions
- Webhook event history
Travel rule
For transfers above regulatory thresholds, exchange originator and beneficiary information using Notabene. See the Notabene integration guide.KYT policy configuration
Block high-risk transactions
Create a policy to block transactions with SEVERE alerts:- Rule: Chainalysis transaction prescreening
- Alert level: SEVERE
- Action: Block
Require approval for risky transactions
Create a policy for compliance review:- Rule: Chainalysis transaction prescreening
- Alert levels: SEVERE, HIGH
- Action: Request approval from compliance team
Alert levels
Chainalysis provides different alert levels:| Level | Meaning | Recommended action |
|---|---|---|
| SEVERE | Strong indicators of illicit activity | Block or escalate immediately |
| HIGH | Significant risk indicators | Require compliance approval |
| MEDIUM | Moderate risk factors | Flag for review |
| LOW | Minor risk indicators | Monitor |
Screening flow
Compliance workflows
Reviewing flagged transactions
When a transaction is flagged:- Compliance team receives notification
- Review transaction details and Chainalysis data
- Make decision (approve or reject)
- Document the decision and rationale
Webhook notifications
Configure webhooks for real-time compliance alerts:policy.approval.pending- Approval neededpolicy.triggered- Policy triggered
Audit and reporting
Transaction reports
Export transaction data for auditors:- Navigate to wallet history in the dashboard
- Filter by date range, direction, or status
- Export to CSV
Auditor access
Create a read-only permission set for external auditors:- View wallets, transactions, and transfers
- View policies and approval history
- View audit logs
- No ability to create, modify, or approve anything
Best practices
Regular policy review
- Review alert thresholds quarterly
- Adjust based on false positive/negative rates
- Update as Chainalysis categories evolve
Documentation
- Document your AML program
- Record why specific thresholds were chosen
- Maintain approval decision rationales
Signed action verification
Every action in Dfns is cryptographically signed by the initiator, providing:- Non-repudiation - Users cannot deny performing actions
- Integrity - Actions cannot be modified after signing
- Attribution - Every action is tied to a specific credential
