
Frameworks, core principles and top case studies for SaaS pricing, learnt and refined over 28+ years of SaaS-monetization experience.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Join companies like Zoom, DocuSign, and Twilio using our systematic pricing approach to increase revenue by 12-40% year-over-year.
The collapse of FTX in November 2022 sent shockwaves through the digital asset industry, wiping out $8 billion in customer funds virtually overnight. According to testimony from FTX's bankruptcy proceedings, the exchange had virtually no internal controls, no segregation of duties, and CEO Sam Bankman-Fried had unilateral access to move customer funds at will. This catastrophic failure wasn't just a cautionary tale—it was a wake-up call for every organization handling cryptocurrency.
As digital assets become increasingly integrated into corporate treasuries, payment systems, and investment portfolios, the absence of proper controls represents an existential risk. A 2023 report by Chainalysis found that cryptocurrency theft reached $3.7 billion globally, with the vast majority of incidents stemming from inadequate internal controls rather than sophisticated external hacks.
For executives responsible for digital asset operations, the question is no longer whether to implement controls, but how to do so effectively. The challenge lies in adapting traditional financial controls to the unique characteristics of blockchain technology—immutable transactions, irreversible transfers, and the absence of intermediary safeguards that exist in traditional banking.
This article outlines nine essential controls that establish a robust framework for cryptocurrency approvals and segregation of duties, drawing from regulatory guidance, industry best practices, and lessons learned from high-profile failures.
Before diving into specific controls, it's important to understand why cryptocurrency requires a fundamentally different approach to internal controls.
Traditional financial systems benefit from built-in safety nets. When you initiate a wire transfer through your bank, there are multiple checkpoints: the bank verifies the transaction, regulatory rails provide time for reversal, and fraud detection systems monitor unusual activity. If something goes wrong, transactions can often be reversed or disputed.
Cryptocurrency operates on a different paradigm. Once a transaction is broadcast to the blockchain and confirmed, it's permanent. There's no customer service line to call, no chargeback mechanism, and no regulatory authority that can reverse an erroneous or fraudulent transfer. According to a study by Crystal Blockchain Analytics, less than 2% of stolen cryptocurrency is ever recovered.
This immutability demands proactive rather than reactive controls. The focus must shift from detection and remediation to prevention and authorization.
The foundation of cryptocurrency segregation of duties begins with multi-signature (multisig) wallets, which require multiple private keys to authorize a transaction.
A multisig wallet operates on an M-of-N signature scheme. For example, a 3-of-5 multisig requires any three out of five designated signers to approve a transaction before it executes. This creates a technical enforcement of approvals that cannot be bypassed, even by insiders with elevated privileges.
According to research by Fireblocks, organizations using multisig wallets experienced 87% fewer unauthorized transactions compared to those relying on single-signature wallets with policy-based controls.
Implementation requires careful consideration of the signature threshold. A 2-of-3 configuration provides security while maintaining operational efficiency for routine transactions. For high-value transfers or sensitive operations, a 3-of-5 or even 4-of-7 configuration may be appropriate.
The key holders should span different roles and departments. A typical configuration might include the CFO, Controller, Treasury Manager, and two members of the Board or audit committee. This ensures that no single department or individual can unilaterally execute transactions.
Role-based access control (RBAC) limits what each team member can see and do within your cryptocurrency management system.
The principle of least privilege dictates that users should only have the minimum access necessary to perform their job functions. In cryptocurrency operations, this means creating distinct roles such as:
According to the 2024 Verizon Data Breach Investigations Report, 74% of breaches involved the human element, including privilege misuse. By limiting access rights, you reduce both the attack surface for external threats and the opportunity for internal fraud.
Modern cryptocurrency custody solutions like Coinbase Custody and BitGo offer granular RBAC features. However, these technical controls must be complemented by regular access reviews. Quarterly audits should verify that access rights remain appropriate as roles change and employees transition.
Transaction limits create automated guardrails that prevent unauthorized or erroneous large-value transfers.
Implement tiered approval requirements based on transaction value:
Velocity controls complement value-based limits by monitoring the frequency and pattern of transactions. For example, you might limit any single wallet to five outbound transactions per day, or flag situations where transaction volume exceeds 150% of the rolling 30-day average.
These controls proved their worth in 2023 when a cryptocurrency exchange employee attempted to gradually siphon funds through small, frequent transactions. The organization's velocity controls flagged the unusual pattern after the third day, preventing the theft of an estimated $2.3 million, according to a case study published by Elliptic.
Private keys are the ultimate authority in cryptocurrency—whoever controls them controls the assets. Dual control ensures that no single individual can access complete private keys.
The most robust approach uses cryptographic key sharding, where a private key is mathematically split into multiple pieces (shards). Each shard is meaningless on its own, but when the required threshold of shards is combined, they reconstitute the full key.
For example, in a 3-of-5 key sharding scheme, the private key is split into five shards distributed to five different individuals. Any three can combine their shards to sign transactions, but no individual—or even pair—can access the funds.
According to guidelines from the New York State Department of Financial Services, institutions holding cryptocurrency must maintain "effective dual control over critical systems and access to cryptocurrency holdings." Key sharding provides mathematical certainty that this requirement is met.
Hardware security modules (HSMs) provide additional protection by performing cryptographic operations within tamper-resistant hardware. The private key never exists in complete form outside the HSM, making it virtually impossible to extract even with physical access to the device.
Not all cryptocurrency needs the same level of accessibility. A segregated wallet strategy balances security with operational efficiency.
Cold wallets are offline storage solutions—private keys never touch an internet-connected device. These should hold 80-95% of your cryptocurrency holdings. Cold wallets might include hardware wallets stored in bank vaults, paper wallets in safety deposit boxes, or institutionally-managed cold storage through qualified custodians.
Hot wallets maintain an internet connection for operational efficiency. These should hold only the working capital necessary for regular business operations—typically 5-20% of total holdings.
The transfer protocol between hot and cold wallets requires the highest level of scrutiny. Cold-to-hot transfers (replenishing operational funds) should require board-level approval and execute on a predetermined schedule. Hot-to-cold transfers (securing excess funds) should occur automatically when hot wallet balances exceed defined thresholds.
According to analysis by CipherTrace, 95% of cryptocurrency thefts target hot wallets. By maintaining the vast majority of holdings in cold storage, you dramatically reduce your exposure to the most common attack vectors.
An allowlist (sometimes called a whitelist) pre-approves destination addresses for cryptocurrency transfers, creating a critical barrier against unauthorized transfers.
Under an allowlist system, transactions can only be sent to addresses that have been previously verified and approved through a separate governance process. Any attempt to send funds to an un-allowlisted address is automatically rejected by the system.
The allowlist approval process should require:
The time-delay is particularly important. According to research by Chainalysis, 64% of cryptocurrency frauds involving address manipulation are detected within 24 hours if proper monitoring is in place. The delay provides a window for detection and intervention before the address becomes active.
Modern wallet management platforms like Fireblocks and Copper allow granular allowlist configurations, including per-address transaction limits and time-based restrictions.
Segregation of duties requires that the individuals executing transactions are not the same ones monitoring and reconciling them.
Establish an independent monitoring function—typically within internal audit or a dedicated compliance team—that reviews all cryptocurrency transactions. This function should have read-only access to all wallets and transaction logs but no ability to initiate or approve transfers.
Daily reconciliation processes should verify:
According to the Association of Certified Fraud Examiners, organizations with robust reconciliation processes detect fraud 33% faster and experience 50% smaller median losses compared to those without.
Blockchain's transparency makes this reconciliation more straightforward than traditional finance. Every transaction is permanently recorded and publicly verifiable. However, this also means reconciliation failures are inexcusable—the data is always available and immutable.
Time-delayed execution creates a cooling-off period between transaction approval and execution, providing a final opportunity to catch errors or fraud.
For transactions exceeding predetermined thresholds (typically $100,000+), implement a mandatory delay between the final approval and actual execution. During this period:
This control proved critical for a Fortune 500 company that in 2023 almost sent $5 million in Bitcoin to a fraudulent address. The 48-hour delay allowed the finance team to identify that the payment request had originated from a compromised email account. The transaction was canceled 36 hours into the delay period, according to a case study presented at the 2024 Financial Executives International conference.
Time delays can be configurable based on transaction characteristics. A payment to a long-established vendor might require 24 hours, while a first-time payment to a new address might require 72 hours regardless of value.
Every action related to cryptocurrency operations must be logged in an immutable, tamper-evident audit trail.
Your logging system should capture:
These logs should be stored in a separate system from the operational cryptocurrency infrastructure, ideally using blockchain or write-once storage technology to ensure immutability. According to Gartner research, organizations using immutable audit logs experience 67% faster incident investigation and 41% higher regulatory compliance scores.
The logs serve multiple purposes beyond forensics. Regular analysis can identify process inefficiencies, training needs, and opportunities for control enhancement. Quarterly reviews by internal audit should look for patterns such as:
Establishing these nine controls requires a phased approach that balances security with operational continuity.
Phase 1 (Weeks 1-4): Assessment and Planning
Phase 2 (Weeks 5-8): Technical Implementation
Phase 3 (Weeks 9-12): Process Integration
Phase 4 (Ongoing): Monitoring and Refinement
The business case for implementing robust cryptocurrency controls becomes clear when you consider the alternative.
Beyond the direct financial losses, inadequate controls create regulatory exposure. The SEC has increasingly scrutinized digital asset firms for control deficiencies. In 2023, the agency issued multiple enforcement actions citing failures in segregation of duties and approval processes, with combined penalties exceeding $400 million.
Reputation damage from a cryptocurrency loss can be even more costly than the theft itself. When QuadrigaCX collapsed in 2019 due to inadequate key management controls, the firm lost not just $190 million in customer assets but its entire business. Customers, partners, and investors lost confidence in the entire organization.
For public companies, a material cryptocurrency loss triggers disclosure obligations, analyst scrutiny, and potential shareholder litigation. The reputational damage extends beyond the immediate incident, affecting customer acquisition costs, partnership opportunities, and even employee retention.
As digital assets mature from speculative investments to core treasury and operational tools, the control environment becomes a differentiator rather than merely a compliance obligation.
Organizations with robust cryptocurrency controls can:
According to a 2024 survey by Deloitte, 76% of financial services executives believe cryptocurrency will become a mainstream alternative to fiat currency within 5-10 years. Organizations establishing mature control environments today position themselves to capitalize on this transformation while managing the inherent risks.
Cryptocurrency's unique characteristics demand a purpose-built control framework that goes beyond traditional financial controls. The nine controls outlined here create a comprehensive defense-in-depth strategy:
The immutability of blockchain transactions means you can't rely on detection and reversal as you can in traditional finance. Prevention through robust controls isn't just a best practice—it's the only practice that works.
For executives overseeing cryptocurrency operations, implementing these controls transforms digital assets from a source of existential risk to a manageable component of the business. The question isn't whether you can afford to implement these controls, but whether you can afford not to.

Join companies like Zoom, DocuSign, and Twilio using our systematic pricing approach to increase revenue by 12-40% year-over-year.