Risks and Controls For AML Monitoring Systems
Risks and Controls For AML Monitoring Systems
Monitoring Systems
Version: Final
Release Date: 12/3/18
Classification: Public treliant.com
Martin V. Jaundoo, CAMS
Senior Manager – Treliant, LLC
Martin Jaundoo, Senior Manager with Treliant, has over 18 years of experience working with large and small
financial institutions, primarily focused on financial crimes compliance. He helps banks ensure Bank Secrecy
Act/Anti-Money Laundering (BSA/AML) and USA PATRIOT Act compliance, fraud prevention, and adherence to
the requirements of the Office of Foreign Assets Control (OFAC).
At Treliant, Martin has worked as part of an independent consultant and monitorship engagement team involved
in the remediation of AML and sanctions compliance programs at global banks. He successfully led projects that
optimized transaction monitoring tool rules and thresholds, increasing operational efficiency.
Before joining Treliant, Martin was a BSA/AML and fraud prevention consultant with the Capco professional
services advisory firm. At Capco, he developed expertise in risk identification and assessment, automated
transaction monitoring tools validation and rules threshold calibration/optimization, transaction monitoring/surveillance investigations
(lookbacks), and enhancement of Customer Due Diligence (CDD) and Enhanced Due Diligence (EDD) measures. His BSA program
work included independent assessments and gap analysis, policy and procedure reviews, and risk model methodology development.
Previously, he held Assistant Vice President roles in BSA/AML compliance with First Southern Bank and First Bank of Miami, and he
was a Senior Investigator/Officer with Ocean Bank.
Among his accomplishments, Martin has contributed to regulator-enforced remediation actions involving enhancements to BSA/AML
programs and reviews of correspondent banking and wire transfer transactions, leading to removal of the regulatory consent order. He
has also automated manual monitoring processes for cost savings and operational efficiencies, trained investigators, and designed and
documented risk models considering clients’ various service offerings, customer characteristics, volume of activity, and geographic
markets. Additionally, Martin has led a readiness and gap analysis addressing the New York State Department of Financial Services’
(NYDFS) Part 504 transaction monitoring rule. He has significant experience with optimization and validation of a wide range of software
tools for transaction monitoring system, sanctions watch-list filtering, and fraud prevention.
Martin received a BSc from Embry Riddle Aeronautical University in Professional Aeronautics with a minor in Aviation Safety and
Management. He is a Certified Anti-Money Laundering Specialist (CAMS).
2
AML Monitoring Systems
AML Monitoring Systems are considered a “model” based on supervisory definition of a
model.
Risk Management
AML monitoring systems invariably present a number of risks. These risks ranges from breakdowns in
compliance controls (fundamental errors in the design may produce inaccurate output that fails to
detect unusual activity) to reputational risks (consequence of not detecting and reporting suspicious
activity resulting in regulatory penalties and negative press).
3
Selecting an AML Monitoring System
Risk
Selection did not analyze the system’s ability to meet the business objectives resulting in system that
did not satisfy business objectives and created transaction monitoring gaps.
Controls
Scenario library provides adequate coverage for risks identified in institutions AML risk
assessment.
4
Implementation of AML Monitoring System
Risk
Inadequate user acceptance testing (UAT) including failure to test all implemented system
components that fail to identify system limitations, and incompatible components.
Controls
1 2 3
Test plan must cover all UAT personnel should be UAT data is illustrative of
system components. well trained on all system institution’s production
components. environment data.
5
Implementation of AML Monitoring System
Continued
Risk
Unclear UAT goals and not defining expected results which failed to identify potential performance
breakdowns.
Controls
Clear definition of expected results and comparing actual results with expectations. For
example, defining expected number of alerts for a velocity scenario and comparing actual
results.
Risk
Controls
UAT should examine system’s capability to perform required functions under stressed
situations including handling extreme data values.
6
AML Monitoring Systems: Assumptions and
Limitations
Risk
Failure to analyze system limitations and assumptions which compromise systems capability to satisfy
business objectives.
Controls
7
Data Transformations
Risk
Data transformation to comply with AML system input requirements compromise data completeness
resulting in ineffective transaction monitoring.
Controls
all data transformations and that critical transaction AML system data input
proxies attributes are not removed standards
8
Data Quality and Completeness
Risk
Failure to identify all data sources and critical data elements required for transaction monitoring
creating transaction monitoring gaps.
Controls
Identify and document all internal and external data sources to ensure all critical
1
sources are ingested in the system.
9
Data Quality and Completeness
Continued
Risk
Frequency of data load from source systems to AML system create potential gap in transaction
monitoring.
Controls
Review data load frequency and verify the loads are done at least daily to avoid potential
transaction monitoring gaps. Example, if wire data is loaded weekly, there may be gaps
when rules are triggered monthly, since the rule will only monitor 3 weeks of data.
Risk
Inadequate data security measures to prevent unauthorized access and modification of data resulting
in data breach.
Controls
The AML system data should fall under a strict enterprise wide data security policy.
10
Data Quality and Completeness
Continued
Risk
Data reconciliation process failing to detect missing data which compromises the system’s
effectiveness.
Controls
11
Data Quality and Completeness
Continued
Risk
Inadequate controls for provisioning, recertification and revocation of system access rights resulting in
access to confidential information by unauthorized users.
Controls
1 2 3
Responsibility of User rights separated by job Procedures to remove users
provisioning users should be function to prevent when they are no longer part
assigned to IT inadvertent access to SAR of compliance department.
information.
12
Data Quality and Completeness
Continued
Risk
Inadequate disaster recovery measures resulting in significant downtime of AML system and potential
backlog of alerts.
Controls
Implement disaster recovery measures to access system from alternate locations when
necessary.
13
Initial Scenarios Implementation
Risk
Scenarios not aligned with typologies identified in AML risk assessment resulting in transaction
monitoring gaps.
Controls
Create coverage assessment that maps risks identified in the risk assessment plus
applicable money laundering typologies to the mitigating scenarios and manual
transaction monitoring measures. Address any gaps with appropriate scenarios.
Risk
Scenario thresholds are not aligned with customer base resulting in over reporting or underreporting.
Controls
14
Validation Risks and Controls
Risk
Controls
15
Ongoing Monitoring
Risk
Inadequate framework defining verification parties and their roles in the ongoing monitoring process
leading to break in the ongoing monitoring process.
Controls
Framework with clear definition of parties, their role and frequency of periodic system
verification.
16
Ongoing Monitoring
Continued
Risk
Inadequate ongoing monitoring and testing of data accuracy resulting in transaction monitoring gaps
due to incomplete data.
Controls
Testing and verifying key data fields are used for transaction monitoring. Key data fields are
1
in Appendix O of FFIEC BSA Exam manual.
Testing for completeness of data by executing queries for missing data fields and null entries
2 in key data fields.
Selecting a judgmental sample of data fields in core systems and comparing to the AML
3 System for a defined period and evaluate whether data was transferred completely and
accurately. Examine judgmental sample to verify inclusion of the following: transaction types,
dates, amounts, cash in/cash out, debit/credit, originator and beneficiary names and
addresses, originator and beneficiary banks, monetary instruments purchaser and payee,
etc.
Reconcile daily dollar amount and volume totals for each transaction type file from source
4
systems to system for a defined time period to identify discrepancies.
17
Ongoing Monitoring
Continued
Risk
Controls
1 2 3
Implement performance Effectiveness challenge Identify KPIs such as
benchmarks including any include scenario scenarios not producing
findings from independent effectiveness ratio, alerts and investigate
reviews indicating comparing number SARs underlying reason.
transaction monitoring filed from AML system and
failure. internal referrals. Comparing
actual results to expected
results and analyzing
discrepancies.
18
Ongoing Monitoring
Continued
Risk
Failing to update AML risk assessment based on trends identified in ongoing monitoring process
resulting in transaction monitoring gaps.
Controls
Risk
Inadequate scenario tuning methodology and process resulting in significant number of false positives
and operation inefficiencies.
Controls
Tuning methodology articulating trigger events, scenario effectiveness ratios, criteria for
above the line, below the line, and rules decommissioning events. Tuning methodology
including trends in KPIs, data analytics and capacity planning is part of the tuning process.
19
Outcomes Analysis (Back-Testing)
Risk
Inadequate sample of scenarios selected for testing failed to provide assurance system is operating
as expected.
Controls
1 2 3 4 5 6 7 8
2) Scenarios 4) Cross-section of 6) All transaction 8) Testing period covering
implemented since logical types. scenarios end of month cut-
most recent components, off.
validation. parameters and
thresholds.
20
Outcomes Analysis (Back-Testing)
Continued
Risk
Failure to adhere to transaction monitoring investigation procedures creating risk for possible late SAR
filing.
Controls
Sample alerts to verify they are dispositioned within time frames consistent with
1 expectations of the procedures.
21
Outcomes Analysis (Back-Testing)
Continued
Risk
Failure to adhere to transaction monitoring investigation procedures creating risk for possible late SAR
filing.
Controls
Perform back testing by reviewing a selection of alerts and trace alerted transactions to
3 source systems and determine if all relevant transactions were captured in the alert.
Perform throughput testing by creating queries that mirror scenario syntax and executing
4 queries against source system data. Evaluate whether results from throughput testing and
system generated alerts are the same and resolve discrepancies.
22
Model Risk Management
Continued
Risk
No clear definition and identification of models according to the institution’s policy resulting in a failure
to identify all models and perform appropriate validations.
Controls
Risk
Model Risk Management policy does not detail scope and frequency of validation resulting in
regulatory criticisms for incomplete and untimely validation.
Controls
Clear definition of all system components subjected to a validation cycle and a validation
frequency consistent with regulatory expectations.
23
Model Risk Management
Continued
Risk
No clear definition of responsibilities within the MRM resulting breakdown of the model.
Controls
Clear definition of the roles and responsibilities of Model developer, Model owner, Model
user, Internal Audit, Information Technology and Application Development and Third Party
Vendor.
Risk
Controls
Create a change management process that requires robust testing before implementation.
Also, track all findings from validation with dates, roles, responsibilities, actions and
resolutions.
24
treliant.com