Skip to main content
Treasury policies protect your organization’s digital assets by requiring approvals for sensitive operations and enforcing transaction limits. This solution covers the policy configurations needed for secure treasury management.

What you’ll need

  • Understanding of policies and how they work
  • Users configured with appropriate permissions
  • Wallets tagged for policy targeting (e.g., treasury, cold-storage)

Components to configure

Multi-signature approvals

Require multiple approvers for high-value transactions. Configure approval quorums (e.g., 2-of-3, 3-of-5) that trigger based on transaction amount thresholds. See how to create policies or manage via API.

Spending limits

Control risk with transaction amount limits and velocity controls:
  • Single transaction limits - Maximum amount per transaction
  • Daily/hourly caps - Total value within a time window
  • Frequency limits - Maximum transactions per time period
See how to configure limits and the policy API reference.

Recipient whitelisting

Restrict outbound transfers to known addresses. Transactions to non-whitelisted recipients can require approval or be blocked entirely. See how to manage your address book and create whitelist policies.

Policy evaluation

Policies evaluate transactions through layered checks:

Example configurations

Conservative treasury

For organizations prioritizing security:
PolicyConfigurationAction
All transactionsAlways trigger2-of-3 approval
Large transactions (>$100k)Amount limit3-of-5 approval
Daily cap ($500k)Velocity limitBlock

Balanced operations

For organizations balancing security with efficiency:
PolicyConfigurationAction
Transactions >$10kAmount limit1-of-2 approval
Transactions >$100kAmount limit2-of-3 approval
Non-whitelisted recipientsRecipient whitelist2-of-3 approval
Daily cap ($1M)Velocity limitBlock

Tiered by wallet type

Apply different limits based on wallet tags:
Wallet TagSingle LimitDaily CapApproval
hot-wallet$10,000$100,0001-of-2
warm-wallet$100,000$1,000,0002-of-3
treasury$500,000$5,000,0003-of-5

Foundation policies

Protect your security configuration itself:
  • Permission assignment protection - Require approval when granting permissions
  • Permission modification protection - Require approval when changing existing roles
  • Policy modification protection - Require approval when changing policies
Start with conservative limits and adjust based on operational experience. It’s easier to relax controls than to recover from a security incident.