Skip to content

Custodial Treasury Security: Classification Framework

Treasury OpsOperationsRisk Management

Authored by:

Dickson Wu
Dickson Wu
SEAL

Reviewed by:

relotnek
relotnek
Filecoin Foundation
Ben S
Ben S
Trail of Bits
Elliot
Elliot

Proper documentation and classification of custodial accounts is essential for institutional treasury security. This guide focuses on the security assessment and classification framework for crypto assets held with third-party custodians.

See also: Registration Documents and Enhanced Controls for High-Risk Accounts

Classification Process

Use this dual classification to determine appropriate security controls for each custodial account.

Step 1: Impact Assessment

Evaluate the consequences if this account is compromised or unavailable.

Financial Impact

Calculate the total value at risk in this account:

  • Current market value of all assets held
  • Include value of any active positions (e.g., staked assets, DeFi deposits)
  • What is the financial impact if unavailable for 7 days?

Operational Impact

Assess the consequences if this account becomes unavailable:

  • What specific operations require this account?
  • Do you have a secondary custody account that can handle these operations?
  • What is the reputational impact if this account is compromised or unavailable?

Regulatory Impact

Evaluate regulatory and compliance consequences:

  • Are assets in this account subject to regulatory reporting requirements (SEC filings, audit requirements)?
  • Does this account hold regulated assets (e.g., stablecoins subject to reserves reporting)?
  • What are the regulatory deadlines that could be missed if this account is unavailable?

Impact Classification

LevelFinancial Exposure (% of Total Assets)Operational DependencyRegulatory Impact
Low<1%No critical operations depend on itNo regulatory reporting tied to this account
Medium1% - 10%Important but alternative funding availablePeriodic reporting; delays manageable
High10% - 25%Critical operations, limited alternativesRegular regulatory filings; delays cause violations
Critical>25%Business-critical, no alternatives for weeksReal-time reporting requirements; SEC filings; audit

Step 2: Operational Assessment

Evaluate how frequently and urgently this account must be accessed.

Transaction Frequency

Document typical transaction patterns:

  • Transactions per month
  • Typical transaction sizes
  • Predictability of transaction timing

Access Urgency

Define response time requirements:

  • What is the maximum acceptable delay for routine transactions?
  • Are there scenarios requiring same-day execution?
  • What are the consequences of 24-hour, 72-hour, or 7-day delays?

Coordination Requirements

Assess how transactions are executed:

  • How many approvers are needed for typical transactions?
  • Are transactions handled manually or through automated systems?
  • Do approvers need to coordinate across timezones?

Note: Single-approver configurations should only be used for low-value operational accounts (<0.1%) with additional compensating controls like strict spending limits and daily reconciliation.

Operational Classification

TypeFrequencyResponse WindowExample Use Cases
Cold Vault<5 tx/month48-72 hoursLong-term reserves, infrequent rebalancing
Warm Storage5-50 tx/month4-24 hoursScheduled payments, planned operations
Active Operations>50 tx/month<4 hoursTrading capital, frequent operational expenses
Time-CriticalUnpredictable<2 hoursCollateral management, market-sensitive operations

Step 3: Security Control Matrix

Combine impact and operational assessments to determine required controls.

Use CaseImpactOperationalApproversMFA RequirementWhitelist DelayAdditional Controls
PaymentsLowActive Ops2Standard TOTP6 hoursBaseline (all accounts): Dedicated devices for custody access, address whitelisting enabled, test small amount to new addresses before full transaction, transaction simulation. Low-specific: Per-transaction cap, monthly aggregate limit
Operational WalletMediumActive Ops2Hardware required12 hoursAll Low controls + daily transaction caps, weekly reconciliation, monthly audit
Liquidation ProtectionMedium-HighTime-Critical2Hardware requiredNoneAll Low/Medium controls + automated alerts for position health, real-time monitoring
DeFi PositionsMedium-HighWarm Storage3Hardware mandatory24 hoursAll Low/Medium controls + smart contract whitelist, position monitoring, daily reconciliation
Trading Capital (variable)HighActive Ops3Hardware mandatory6 hoursAll Low/Medium controls + smart contract whitelist, real-time monitoring, daily reconciliation
Active Treasury (5-10%)HighWarm Storage3-4Hardware mandatory24 hoursAll Low/Medium controls + transaction velocity limits, SIEM monitoring, multi-channel confirmation
Secondary Reserve (10-25%)CriticalCold Vault4-5Hardware mandatory48 hoursAll Low/Medium/High controls + geographic distribution of approvers, MPC recommended
Primary Reserve (>25% assets)CriticalCold Vault5-7Hardware mandatory72 hoursAll Low/Medium/High controls + geographic distribution of approvers, MPC recommended

Step 4: Document Your Decision

  • Record impact level and operational type with justification
  • Capture approver thresholds and required controls
  • Store links to relevant custody accounts and addresses

Proceed to: Registration Documents

For Critical/High accounts, ensure you also review: Enhanced Controls for High-Risk Accounts