Logo
AML/CTF Compliance Guide

The 3-Step Framework

AUSTRAC's 3-step framework for building and maintaining your AML/CTF compliance program — and how Verifia supports each step.

AUSTRAC structures AML/CTF compliance around a practical 3-step lifecycle. This framework is used across all five Tranche 2 industries and is reflected in AUSTRAC's program starter kits. Verifia is designed to guide you through each step.

Step 1: Customise Your Program

This is the setup phase where you tailor your AML/CTF program to your specific business. A program that is not customised to your operations will not be effective and may not satisfy AUSTRAC's requirements.

What you need to do

  1. Identify your designated services — determine which of your business activities are regulated under the AML/CTF Act
  2. Complete your ML/TF risk assessment — evaluate your risk across customers, services, delivery channels, and geography
  3. Determine your risk appetite — decide how much ML/TF risk your business is willing to accept and what controls you will apply
  4. Build your AML/CTF program — create your policies and procedures based on your risk assessment, using AUSTRAC's starter kit as a foundation
  5. Set up personnel obligations — appoint your Compliance Officer, plan training, and conduct initial personnel due diligence on all relevant staff
  6. Communicate to staff — ensure all personnel have read, understood, and acknowledged the program before it takes effect
  7. Obtain senior manager approval — your program must be formally approved by a senior manager before implementation

How Verifia helps

TaskVerifia feature
Identify designated servicesIndustry-specific service catalogue auto-loaded during onboarding
ML/TF risk assessmentGuided questionnaire covering all four risk dimensions, with automated scoring and PDF report
AML/CTF programAI-generated draft based on your risk assessment and industry, with built-in editor for customisation
Personnel setupStaff management with Compliance Officer designation, role assignment, and due diligence tracking
Staff communicationRead-and-acknowledge workflow with timestamped audit trail
Senior manager approvalFormal approval workflow with digital sign-off

Step 2: Use Your Program

This is the day-to-day operational phase where you apply your program to real customers and transactions. Your program is only effective if it is consistently used.

What you need to do

  1. Perform initial CDD — identify, verify, and risk-assess every customer before providing a designated service
  2. Conduct ongoing CDD — keep customer information current, monitor for changes in risk, and conduct scheduled reviews
  3. Monitor transactions — watch for threshold transactions ($10,000+ in physical currency), suspicious activity, and unusual patterns
  4. Submit reports — file SMRs (within 24 hours for terrorism financing, 3 business days for other matters), TTRs (within 10 business days), and annual compliance reports
  5. Escalate and decide — when risk indicators or suspicious behaviour are identified, follow your escalation pathway: investigate, apply additional controls, report, or refuse service
  6. Manage personnel — deliver ongoing training, conduct periodic personnel due diligence reviews, and manage role changes and departures

How Verifia helps

TaskVerifia feature
Initial CDDKYC Workbench with guided forms, eKYC identity verification (DVS), and sanctions/PEP screening
Ongoing CDDAutomated review scheduling based on risk tier, with triggered reviews for new risk indicators
Transaction monitoringConfigurable rule engine with industry-specific rules (including linked transaction detection for precious metals)
ReportingAssisted SMR/TTR drafting with pre-filled customer and transaction data, deadline tracking, and LPP assessment for legal practitioners
EscalationStructured decision workflow (proceed / apply controls / report / refuse) with documented rationale and audit trail
Personnel managementTraining module assignment, completion tracking, due diligence scheduling, and departure procedures

Step 3: Maintain and Review

This is the ongoing improvement phase. AML/CTF compliance is not a set-and-forget exercise — your program must evolve as your business, customers, and the threat environment change.

What you need to do

  1. Review your risk assessment — update when your circumstances change (new services, new customer types, new jurisdictions, or new ML/TF typologies)
  2. Update your program — revise policies and procedures to reflect changes in risk, regulation, or business operations
  3. Conduct independent reviews — arrange periodic independent assessments of your program's effectiveness (AUSTRAC recommends this, and it may become mandatory)
  4. Test your controls — verify that your CDD processes, monitoring rules, and reporting procedures are working as intended
  5. Report annually — submit your annual compliance report to AUSTRAC
  6. Respond to triggers — when specific events occur (regulatory changes, compliance incidents, audit findings), initiate a program review promptly

How Verifia helps

TaskVerifia feature
Risk assessment reviewVersion history with side-by-side comparison, triggered review prompts
Program updatesVersion-controlled program with change tracking and staff re-acknowledgment workflow
Independent reviewsReview workflow with findings tracking and remediation management
Control testingCompliance health score, system metrics, and effectiveness indicators
Annual reportingGuided annual report generation using compliance data collected throughout the year
Trigger managementAutomated trigger detection (regulatory updates, overdue reviews, incidents) with review prompts

The compliance lifecycle

  ┌─────────────────────────────────────────────┐
  │  STEP 1: CUSTOMISE                          │
  │  Risk Assessment → Program → Personnel      │
  │  (Do this before 1 July 2026)               │
  └──────────────────┬──────────────────────────┘

                     v
  ┌─────────────────────────────────────────────┐
  │  STEP 2: USE                                │
  │  CDD → Monitor → Report → Escalate         │
  │  (Day-to-day operations)                    │
  └──────────────────┬──────────────────────────┘

                     v
  ┌─────────────────────────────────────────────┐
  │  STEP 3: MAINTAIN                           │
  │  Review → Update → Test → Report            │
  │  (Ongoing improvement)                      │
  └──────────────────┬──────────────────────────┘

                     └──── (cycle repeats) ──────>

The three steps are not a one-time journey. After initial setup (Step 1), your program should continuously cycle between day-to-day use (Step 2) and periodic maintenance (Step 3). Each review cycle strengthens your program and helps you stay ahead of emerging ML/TF risks.

The 3-Step Framework