Banking-grade encryption99.9% uptime
Compliance15 min read

AML Compliance Guide: Anti-Money Laundering for Fintechs & Businesses (2026)

Complete guide to AML compliance — anti-money laundering regulations, requirements, risk assessment, transaction monitoring, sanctions screening, and how to build an AML program that satisfies regulators.

Edge Team

Edge Team

Anti-money laundering compliance is not something you can figure out later. If your business handles financial transactions — payments, lending, crypto, insurance, trading, or even marketplace payouts — AML is your legal obligation from day one. The penalties for getting it wrong are severe: multi-billion-dollar fines, criminal prosecution, license revocation, and the loss of banking relationships that can shut down your business overnight.

This guide covers what AML compliance actually requires, how to build a program that satisfies regulators without paralyzing your business, and where API-driven automation can replace manual processes.

What Is Anti-Money Laundering (AML)?

Anti-money laundering (AML) is the set of laws, regulations, and procedures designed to prevent criminals from disguising illegally obtained funds as legitimate income. Money laundering is the process of making "dirty" money appear "clean" — and it is a massive global problem.

The Scale of the Problem

  • $800 billion to $2 trillion is laundered globally each year (2-5% of global GDP, per UN estimates)
  • Less than 1% of illicit financial flows are intercepted
  • Money laundering enables drug trafficking, human trafficking, terrorism, corruption, tax evasion, and sanctions evasion
  • The financial system is the primary vehicle for laundering — which is why financial institutions bear the regulatory burden

The Three Stages of Money Laundering

Understanding how money laundering works helps you understand what your AML controls need to detect:

1. Placement — Getting dirty money into the financial system. This is the most detectable stage. Methods include structuring cash deposits below reporting thresholds ("smurfing"), using shell companies to deposit large sums, and mixing illicit funds with legitimate business revenue.

2. Layering — Creating complex transaction chains to obscure the money's origin. Methods include transferring funds between multiple accounts across jurisdictions, converting between currencies, purchasing and selling assets, and using trade-based laundering to disguise value transfers as legitimate commerce.

3. Integration — Reintroducing the "cleaned" money into the legitimate economy. Methods include purchasing real estate, investing in businesses, luxury goods purchases, and invoice manipulation.

AML Regulatory Framework

International Standards: FATF

The Financial Action Task Force (FATF) is the global standard-setter for AML/CFT (Counter-Financing of Terrorism). Its 40 Recommendations form the basis of AML laws in virtually every country. Key recommendations include:

  • Recommendation 1: Risk-based approach — allocate compliance resources proportional to risk
  • Recommendation 10: Customer due diligence (KYC)
  • Recommendation 11: Record-keeping (5+ years)
  • Recommendation 12: Enhanced due diligence for PEPs
  • Recommendation 16: Wire transfer "Travel Rule" — share originator/beneficiary information
  • Recommendation 20: Suspicious transaction reporting
  • Recommendation 26: Regulation and supervision of financial institutions

Key Jurisdictions

United States:

  • Bank Secrecy Act (BSA) — the foundational AML law
  • USA PATRIOT Act — expanded BSA requirements post-9/11
  • FinCEN — the regulatory and enforcement body
  • OFAC — administers sanctions programs
  • Requirements: KYC/CDD, SAR filing, CTR filing ($10K+), OFAC screening

European Union:

  • 6th Anti-Money Laundering Directive (6AMLD) — harmonizes AML across EU
  • Anti-Money Laundering Regulation (AMLR) — directly applicable regulation (2026)
  • EU Anti-Money Laundering Authority (AMLA) — new centralized supervisory body
  • Requirements: KYC/CDD/EDD, suspicious transaction reporting, beneficial ownership registers

United Kingdom:

  • Money Laundering Regulations 2017 (as amended)
  • Proceeds of Crime Act 2002 (POCA)
  • Financial Conduct Authority (FCA) — supervises AML compliance
  • Requirements: Similar to EU framework, with UK-specific reporting obligations

Gulf Cooperation Council (GCC):

  • Saudi Arabia: Anti-Money Laundering Law, supervised by SAMA and SAFIU
  • UAE: Federal AML law, supervised by Central Bank and Financial Intelligence Unit
  • Bahrain: Financial Crime Module under CBB regulations
  • All GCC countries follow FATF standards with local implementation

Penalties for Non-Compliance

The financial penalties are staggering:

Institution Year Fine Violation
BNP Paribas 2014 $8.9B Sanctions violations (Sudan, Iran, Cuba)
Deutsche Bank 2017 $628M Russian mirror trading scheme
Danske Bank 2022 $2B Estonian branch money laundering
Standard Chartered 2019 $1.1B Sanctions and AML failures
Westpac 2020 A$1.3B 23M+ breaches of AML reporting obligations
Capital One 2021 $390M Willful BSA/AML violations

Beyond fines: criminal prosecution of compliance officers and executives, loss of banking relationships (derisking), license revocation, and reputational damage that can be impossible to recover from.

Building an AML Compliance Program

An effective AML program has five core components, commonly called the "five pillars":

Pillar 1: Compliance Officer and Governance

Designate a qualified AML Compliance Officer with sufficient authority, resources, and direct access to senior management and the board. This person is responsible for:

  • Designing and maintaining the AML program
  • Filing suspicious activity reports (SARs)
  • Overseeing compliance training
  • Managing regulatory examinations
  • Reporting to the board on AML risks and program effectiveness

For fintechs: this does not have to be a full-time role at early stages, but someone must own it, and they need actual authority — not just a title.

Pillar 2: Internal Policies, Procedures, and Controls

Document your AML policies in writing. Regulators want to see:

  • Customer acceptance policy (who you will and will not onboard)
  • KYC/CDD procedures for individuals and businesses
  • Enhanced due diligence triggers and procedures
  • Transaction monitoring rules and thresholds
  • Suspicious activity identification and reporting procedures
  • Sanctions screening procedures
  • Record-keeping policies (minimum 5 years in most jurisdictions)
  • Escalation procedures for alerts and unusual activity

These cannot be generic templates downloaded from the internet. They must be tailored to your specific business, products, customers, and risk profile.

Pillar 3: Risk Assessment

Conduct a formal AML risk assessment that evaluates:

Customer risk:

  • Customer types (individuals, businesses, financial institutions)
  • Geographic distribution (high-risk countries per FATF)
  • Industry sectors (some industries are higher risk — crypto, gambling, precious metals)
  • PEP exposure

Product/service risk:

  • Which of your products can be exploited for laundering?
  • Do you offer anonymous or pseudo-anonymous services?
  • What transaction limits apply?

Geographic risk:

  • Where do your customers come from?
  • Where do funds flow to/from?
  • Do you operate in or transact with FATF grey/black list countries?

Channel risk:

  • Do you onboard customers remotely (higher risk) or in person?
  • How do customers access your services?

The risk assessment should be documented, approved by senior management, and updated at least annually or when material changes occur.

Pillar 4: Customer Due Diligence (KYC)

This is covered extensively in our KYC Verification Guide. The key elements:

  • Customer identification and verification — confirm identity using reliable, independent sources
  • Beneficial ownership identification — determine who ultimately owns or controls the customer (25% ownership threshold in most jurisdictions)
  • Purpose and nature of the relationship — understand why the customer wants your services
  • Ongoing monitoring — update customer information and monitor transactions

API-driven CDD components:

Check What It Verifies Edge API
IBAN validation Bank account is real and correctly formatted IBAN Validation
Sanctions screening Customer is not on any sanctions list Sanctions Screening
Business registration Company exists and is active CR Lookup
Email verification Email address is valid and deliverable Email Validation
Phone verification Phone number is valid and active Phone Validation

Pillar 5: Training

All relevant employees must receive AML training that covers:

  • What money laundering and terrorism financing look like in practice
  • Red flags specific to your business and industry
  • How to identify and escalate suspicious activity
  • Regulatory reporting obligations
  • Consequences of non-compliance (personal and institutional)

Training must be documented, conducted at onboarding and refreshed annually, and updated when regulations or your business change.

Transaction Monitoring

Transaction monitoring is where your AML program detects suspicious activity after onboarding. This is where most of the ongoing operational effort and technology spend goes.

What to Monitor

Rule-based scenarios:

  • Transactions above certain thresholds (e.g., $10,000 CTR threshold in the US)
  • Rapid movement of funds (in and out within a short period)
  • Structured transactions designed to avoid reporting thresholds ("smurfing")
  • Transactions to/from high-risk countries
  • Transactions inconsistent with the customer's profile
  • Round-number transactions (often associated with trade-based laundering)
  • Dormant accounts with sudden activity

Behavioral analytics:

  • Deviation from established transaction patterns
  • Peer group comparison (is this customer's activity normal compared to similar customers?)
  • Network analysis (are multiple customers connected through shared counterparties, addresses, or devices?)
  • Velocity changes (sudden increase in transaction frequency or value)

Alert Management

Transaction monitoring generates alerts. Too few alerts means you are missing real risks. Too many alerts means your compliance team drowns in false positives and cannot investigate effectively.

Industry benchmarks suggest that 95-98% of transaction monitoring alerts are false positives. This is a massive operational problem. The key is tuning your rules and models to maximize detection of genuine suspicious activity while minimizing noise.

Sanctions Screening

Sanctions screening is a critical component of AML compliance. You must screen:

  • At onboarding: Before establishing a business relationship
  • For every transaction: Particularly for counterparties you have not screened before
  • On an ongoing basis: When sanctions lists are updated

The Challenge

Sanctions lists contain over 1.2 million entities across 350+ government sources. Names come in multiple languages, scripts, and transliterations. "Mohammed" can be spelled dozens of ways. Russian and Chinese names have multiple romanization standards. People use aliases, maiden names, and partial names.

Simple exact-match screening misses true positives. Overly aggressive fuzzy matching generates thousands of false positives per day.

The Solution

Edge's Sanctions Screening API screens against 1.2M+ entities from 350+ sources with intelligent fuzzy matching that handles transliteration, name variations, and partial matches. Each potential match is scored by confidence, so your compliance team can focus on high-confidence hits and filter out low-confidence noise.

curl https://api.edge-api.com/v1/sanctions/screen \
  -H "Authorization: Bearer YOUR_API_KEY" \
  -d "name=John Smith" \
  -d "type=individual"

Suspicious Activity Reporting (SARs)

When your monitoring or screening identifies genuinely suspicious activity, you must file a Suspicious Activity Report (SAR) with your jurisdiction's Financial Intelligence Unit (FIU):

  • US: FinCEN (file via BSA E-Filing)
  • EU: National FIUs (vary by member state)
  • UK: National Crime Agency (NCA) via the SAR Online system
  • Saudi Arabia: SAFIU
  • UAE: goAML

When to File

File a SAR when you have reasonable suspicion that a transaction involves proceeds of crime, is designed to evade reporting requirements, has no apparent lawful purpose, or involves sanctioned parties. You do not need certainty — reasonable suspicion is the threshold.

Tipping Off

In most jurisdictions, it is a criminal offense to inform the customer that a SAR has been filed or that they are under investigation. This is called "tipping off" and can result in criminal prosecution of the person who disclosed the information.

AML for Fintechs: Practical Considerations

Start with the Risk Assessment

Before you build anything, understand your specific AML risks. A payment processor faces different risks than a crypto exchange, which faces different risks than a lending platform. Your AML program must be tailored to your actual risk profile.

Automate What You Can

Manual AML processes do not scale. Key areas for automation:

  1. IBAN/account validation — Validate bank accounts programmatically at onboarding instead of manually checking formats
  2. Sanctions screening — Real-time API calls instead of manual spreadsheet lookups
  3. Business verification — API-based company registry checks instead of manual document review
  4. Transaction monitoring — Rules-based alerting with machine learning models to reduce false positives
  5. Contact verification — Automated email and phone validation to confirm customer reachability

Do Not Over-Engineer

A common mistake is building an overly complex AML program that generates more noise than signal. Start with the fundamentals:

  • Solid KYC at onboarding
  • Real-time sanctions screening
  • Basic transaction monitoring rules tuned to your actual product
  • Clear escalation and SAR filing procedures

You can add sophistication (ML models, network analysis, behavioral analytics) as your business grows and your risk profile becomes clearer.

Document Everything

Regulators care about two things: (1) that you have adequate controls, and (2) that you can prove it. Document your risk assessment, policies, procedures, training records, screening results, investigation outcomes, and SAR filings. Retain records for the legally required period (typically 5-7 years).

AML Compliance Checklist

Use this as a starting point for your AML program:

  • Designated AML Compliance Officer with board-level reporting
  • Formal risk assessment (documented, approved by senior management)
  • Written AML policies and procedures
  • Customer identification and verification (KYC) procedures
  • Enhanced due diligence for high-risk customers
  • Beneficial ownership identification (25% threshold)
  • Sanctions screening at onboarding and for all transactions
  • PEP screening and ongoing monitoring
  • Transaction monitoring rules calibrated to your business
  • Alert investigation and disposition procedures
  • SAR filing procedures and access to e-filing systems
  • Record-keeping policy (minimum 5 years)
  • Employee training program (onboarding + annual refresh)
  • Independent testing/audit (annual)
  • Board reporting on AML program effectiveness

Frequently Asked Questions

What is the difference between AML and KYC?

KYC (Know Your Customer) is a component of AML. AML is the broader framework that includes KYC, transaction monitoring, sanctions screening, suspicious activity reporting, and ongoing compliance. KYC specifically focuses on identifying and verifying customers at onboarding and throughout the relationship.

Do all businesses need AML compliance?

AML requirements apply to "obliged entities" — primarily financial institutions, payment processors, fintechs, crypto platforms, insurance companies, and certain professional services (lawyers, accountants, real estate agents). The specific obligations vary by jurisdiction and business type.

How much does AML compliance cost?

Costs vary widely based on business size and complexity. For a small fintech, AML compliance might cost $50,000-$200,000 annually (technology, personnel, training, and audit). For large financial institutions, costs run into hundreds of millions. The cost of non-compliance is always higher.

What is a risk-based approach to AML?

A risk-based approach means allocating your compliance resources proportional to the risks you face. Higher-risk customers, products, and geographies get more scrutiny (enhanced due diligence, more frequent monitoring). Lower-risk areas get proportionally less. This is the approach recommended by FATF and required by most regulators.

How often should AML policies be updated?

At minimum annually, or whenever there are material changes to your business, products, customer base, or the regulatory environment. The risk assessment should also be refreshed annually.

What is the FATF grey list?

The FATF grey list (officially "Jurisdictions under Increased Monitoring") identifies countries with strategic deficiencies in their AML/CFT frameworks that have committed to resolving them. Being on the grey list means enhanced scrutiny for transactions involving those countries. The list is updated three times per year.

Start building with Edge

Get 500 free API credits instantly. No credit card required. Full access to IBAN validation, sanctions screening, exchange rates, and all 12 services.

Trusted by fintechs and banks across the GCC.