RiskTemplates · The Daily Brief Friday, May 22, 2026

Feature Operational Risk

AUP Ongoing Monitoring: What to Watch After You Approve a Higher-Risk Customer

Your AUP exception memo approved the customer. The compliance work isn't done — here's the behavioral monitoring framework, re-review triggers, and exit process that keeps the approval defensible over time.

By Rebecca Leung · May 20, 2026 ·
Table of Contents

TL;DR

  • Approving a higher-risk customer is the beginning of the compliance work, not the end of it
  • FinCEN’s CDD rule requires ongoing monitoring commensurate with customer risk — “risk-based” means more frequent and more granular monitoring for higher-risk relationships
  • Behavioral triggers for re-review: volume drift vs. approved use case, new counterparties or geographies, product use outside approved scope, complaint spikes, adverse media
  • Evolve Bank’s 2024 Federal Reserve enforcement action cited failure to maintain adequate customer monitoring of fintech partnerships — monitoring gaps, not approval gaps
  • Doing nothing after observing behavioral drift creates documented evidence that you knew — which is worse than not monitoring at all

You approved the customer. The exception memo is signed. The account is open.

Now what?

For most compliance teams, the AUP work stops there. Due diligence is done, the approval is documented, and the relationship moves to operations. Monitoring — if it exists — means the same automated transaction alerts covering every other customer.

That’s the gap. The due diligence that justified approval was customer-specific: specific business type, specific fund flows, specific counterparties, specific use case. The conditions that made the relationship acceptable at approval are the same conditions you need to verify are still holding six months later.

Higher-risk customer monitoring isn’t optional. It’s the fourth pillar of FinCEN’s CDD framework — and the one that breaks down most often.

What FinCEN Actually Requires

The FinCEN CDD Final Rule establishes four pillars of customer due diligence for covered financial institutions:

  1. Customer identification and verification (CIP)
  2. Beneficial ownership identification
  3. Understanding the nature and purpose of the customer relationship
  4. Risk-based ongoing customer due diligence — including ongoing monitoring to identify and report suspicious activity and, on a risk basis, maintaining and updating customer information

That fourth pillar is what requires higher-risk customers to receive more intensive monitoring than standard accounts. “Risk-based” isn’t ambiguous: the intensity, frequency, and granularity of ongoing monitoring must be commensurate with the customer’s risk profile.

FinCEN is also explicit about what triggers a re-review: “a significant and unexplained change in the customer’s activity” requires review and update of the customer’s risk profile. This isn’t an annual calendar event — it’s a behavioral trigger. If activity changes materially, you’re required to look again.

The industry is moving clearly in this direction. A 2026 fintech compliance review found that 40% of financial institutions now base risk assessments on significant behavior changes or negative news alerts rather than static, scheduled review dates. That shift — from periodic to event-driven (perpetual KYC) monitoring — is both an emerging best practice and an examiner expectation.

What “Consistent with Approved Use Case” Actually Means

Your AUP approval memo documented a specific use case: what the customer does, what transactions they’ll run, where funds come from, and which counterparties they interact with. Ongoing monitoring means verifying that what’s actually happening matches that description.

The FFIEC BSA/AML Examination Manual is direct: financial institutions must monitor transactions and account activity for consistency with what they know about their customers. Deviations from the expected pattern are monitoring triggers, not curiosities.

In practice, translating an approval memo into monitoring parameters means documenting four things at approval:

  • Volume baseline: The expected monthly run rate. Set monitoring triggers at ±50% of this baseline.
  • Counterparty and geography scope: The expected counterparty footprint. Flag transactions outside it.
  • Product use scope: The specific products approved. Monitor for use of products outside the approved set.
  • Settlement patterns: The expected timing and structure of settlements. Flag irregular patterns inconsistent with the stated business cycle.

These parameters should live in your case management or CRM system — not just in a PDF file that gets archived after approval.

The Five Behavioral Signals That Require Re-Review

1. Volume Drift Beyond the Approved Baseline

A customer approved at $500K/month running $2M/month hasn’t necessarily done anything wrong — but that activity needs to be verified against the stated business purpose. Volume growth that isn’t explained by an identifiable business reason (seasonal surge, new contract, product launch) is a signal that the account’s actual use is broader than disclosed.

Monitoring approach: Set a volume trigger at ±50% of the stated monthly baseline. Any month that exceeds the trigger generates a review task — not an automatic SAR, but a verification inquiry with documented outcome.

2. New Counterparties or Jurisdictions

The most underutilized field in a new customer file is the counterparty list. If a customer describes their business as domestic B2B payments between known vendors, and monitoring shows high-value transactions to new offshore entities in unexpected jurisdictions, the relationship profile has changed.

Monitoring approach: Run monthly counterparty analysis against the customer’s disclosed counterparty footprint. Flag net-new high-value counterparties (above a materiality threshold you define) for review within 15 business days.

3. Product Use Outside Approved Scope

Platform rules and AUP categories apply to specific products and transaction types. A customer in a restricted or enhanced-review category was approved for specific products for specific reasons. If an approved ACH-only customer begins using card issuing, instant transfer, or crypto features, the alert should route to compliance — not just fraud operations.

Monitoring approach: Configure product-level usage alerts in your core platform or payment processing system for each higher-risk customer. This requires a conversation with your technical or operations team about per-customer alert rules — most modern payment platforms support this configuration.

4. Complaint or Chargeback Spike

An unusual number of consumer complaints or chargebacks attributable to a single higher-risk customer is a direct signal that their activity is harming end customers — or that the underlying activity is different from what was approved. This is particularly relevant for payment aggregators, marketplace platforms, and BNPL products where the customer’s end consumers file disputes against your platform.

Monitoring approach: Track complaints and chargebacks attributable to each higher-risk customer on a rolling 90-day basis. Set a relative trigger (3x the normal complaint rate for comparable customer types) and an absolute trigger (5+ complaints in a calendar month).

5. Adverse Media or Third-Party Risk Signals

A news event, a legal filing, a regulatory action, or a sponsor bank RFI about a specific customer can fundamentally change the risk picture in a way that transaction monitoring won’t catch. Adverse media monitoring is the external complement to behavioral transaction analysis.

Monitoring approach: Set up alerts for each higher-risk customer’s entity name and principal names. Configure sponsor bank RFIs as an automatic re-review trigger — an RFI about a specific customer from your bank partner is a direct signal that their risk posture toward that relationship has shifted. As covered in detail in the sponsor bank RFI KRI post, rising RFI volume plus subject matter drift toward compliance-program questions is an early debanking signal.

What Happens When Monitoring Shows Drift

Catching behavioral drift creates an obligation to act. Documenting the deviation without responding to it is the worst possible outcome — it creates a record that you knew and chose to continue.

Step 1: Document the deviation. What was approved vs. what you’re observing. When the change appears to have started. The specific transaction data supporting the observation.

Step 2: Re-run the approval analysis on current activity. Is the observed activity within your AUP? Can you monitor it effectively with available controls? Does your bank partner’s policy permit this type of activity at this volume? Is the business rationale for the change credible and verifiable?

Step 3: Make a documented decision. Four options:

DecisionWhen to Use It
Update the approval memoCurrent activity is acceptable, verifiable, and documentable — record the new scope and monitoring parameters
Impose restrictionsActivity has drifted but the relationship is salvageable — restrict to original approved scope via platform controls
Escalate to bank partnerActivity implicates bank partner risk appetite — clear with them before deciding whether to continue
Initiate exitActivity cannot be accommodated within your AUP and available controls

Doing nothing is not on the list. “We noticed and decided it wasn’t worth re-reviewing” becomes your documentation record if a regulator or bank partner asks later.

The Enforcement Record

The Federal Reserve’s June 2024 cease-and-desist against Evolve Bank & Trust is the clearest recent example of what happens when ongoing monitoring of higher-risk relationships fails. The order found that Evolve failed to maintain an effective risk management framework for its fintech partnerships — specifically, inadequate ongoing oversight and monitoring of those relationships. The bank’s compliance program did not keep pace with the transaction behaviors of its fintech clients as those businesses scaled.

Consequence: Evolve was barred from onboarding new fintech partners and launching new products without prior Federal Reserve approval. The enforcement wasn’t about the initial approvals. It was about the failure to monitor what was happening after approvals were granted.

TD Bank’s $3.1 billion resolution in October 2024 also documented backlogs of customers to be exited that “presented unacceptable AML risk” — customers whose ongoing activity had crossed into high-risk territory and were never removed from the portfolio. The original approval decision had been made. The exit decision was never triggered by monitoring. That failure is a monitoring failure, not an onboarding failure.

Both cases share the same structural gap: the compliance investment was concentrated at the front of the relationship (onboarding, due diligence) with inadequate ongoing oversight of what happened after the account opened.

Structuring Your AUP Monitoring Program

The minimum viable monitoring program for higher-risk customers has four components:

ComponentWhat It CoversCadence
Transaction monitoring triggersVolume drift, counterparty changes, product use outside approved scope, settlement pattern anomaliesContinuous / daily
Periodic EDD re-reviewFull re-run of the original approval analysis against current activityAnnual at minimum; or event-triggered, whichever comes first
Adverse media / external signalsNegative news, legal actions, regulatory developments, sponsor bank RFIsOngoing; monthly scan for all higher-risk customers
Portfolio-level compliance reportingAggregate view of higher-risk customers by category, complaint rate, monitoring trigger activity, re-reviews completed vs. outstandingQuarterly to risk committee

The Exit Process Done Right

Exit is the hardest part of higher-risk customer management, but it’s essential that the exit process be as documented as the approval process.

The mechanics of a defensible exit:

  1. Follow the exit triggers you defined at approval. Your original exception memo should have included specific conditions under which the relationship would be re-evaluated or terminated. Use those as the basis for the exit decision — they represent your advance judgment about what risk you could manage.

  2. Do not cite constitutionally protected activity. The OCC has issued guidance explicitly warning banks against exits driven by customer industry or viewpoints rather than concrete compliance risk. Document the specific transaction behavior, compliance finding, or control failure that drives the exit — not a general reputational concern.

  3. Match approval authority. If the relationship required senior compliance sign-off or risk committee approval to open, exit should be reviewed at the same level. This protects against exits driven by operational convenience rather than risk analysis.

  4. Give contractual notice. Follow the notice requirements in your customer agreement. Most agreements allow termination for cause with shorter notice periods — “for cause” should be documented in the exit memo.

So What?

If your AUP program ends at approval, you’re carrying the risk of every approved higher-risk customer without the protection of knowing whether the relationship is still what you agreed to.

The practical starting point:

  1. Pull every active AUP exception memo. Does each one document a volume baseline, counterparty scope, and approved products? If not, reconstruct the parameters from the original due diligence file.
  2. Configure behavioral triggers for each higher-risk customer in your transaction monitoring system: volume, counterparty, product scope. This likely requires a conversation with your fraud or operations team about per-customer alert rules.
  3. Set a calendar for annual EDD re-reviews and load each higher-risk customer onto it. The calendar should be in your issues management or compliance tracking system, not a personal spreadsheet.
  4. Document re-review outcomes. “Reviewed on [date], activity consistent with approved use case, no change required” is a defensible record. “No review conducted” is not.

For teams building or formalizing their AUP program, the Compliance Essentials bundle includes the AUP template, exception memo structure, restricted and prohibited category due diligence guides, and the ongoing monitoring framework that ties them together — from the initial approval decision through the ongoing oversight that keeps it defensible.


Related reading:

◆ Need the working template?

Start with the source guide.

These answer-first guides summarize the required fields, evidence, and implementation steps behind the templates practitioners search for.

◆ FAQ

Frequently asked questions.

How often should you review a higher-risk customer after approval?
High-risk customers require annual EDD renewal at minimum, but the regulatory direction is toward event-driven (perpetual KYC) monitoring rather than calendar-based reviews. FinCEN's CDD rule is explicit that 'a significant and unexplained change in the customer's activity' triggers review and update of the risk profile. For most higher-risk categories, this means maintaining automated triggers for volume spikes, counterparty changes, and complaint patterns — and conducting a formal re-review when those triggers fire, regardless of where you are in the annual review cycle.
What transaction behaviors should trigger a higher-risk customer re-review?
Five categories of behavioral signals: (1) material change in transaction volume vs. the approved use case baseline (typically ±50% from stated monthly run rate), (2) transaction counterparties or geographies inconsistent with the stated business purpose, (3) product use outside the approved scope, (4) complaint or chargeback spike attributable to the customer, and (5) adverse media or a bank partner RFI about the specific account. Any one should trigger re-review; any two should trigger escalation.
What does FinCEN's CDD rule actually require for ongoing monitoring?
The FinCEN CDD Final Rule (31 CFR § 1020.210) requires covered financial institutions to develop risk-based procedures for ongoing CDD including two core elements: (1) ongoing monitoring to identify and report suspicious activity, and (2) on a risk basis, maintaining and updating customer information. 'Risk-based' means higher-risk customers require more frequent and more granular monitoring than lower-risk ones. The rule doesn't specify a review frequency — it requires that frequency be commensurate with the customer's actual risk profile, which means you must define and document your own risk-tiered monitoring cadence.
What's the difference between transaction monitoring and customer monitoring?
Transaction monitoring is alert-based: it flags specific transactions or patterns based on predefined rules (high-value, unusual counterparty, sanctions match, volume spike). Customer monitoring is relationship-based: it evaluates whether the customer's overall behavior pattern remains consistent with the approved use case and risk profile. Both are required, and they answer different questions. Transaction monitoring asks 'is this transaction suspicious?' Customer monitoring asks 'is this relationship still what I approved?' For higher-risk customers, you need both.
What do you do when monitoring reveals a customer's activity has drifted from the approved use case?
Three-step response: (1) Document the deviation — what was approved vs. what you observe, and when the change started. (2) Re-run the approval analysis on the current activity: does it fall within your AUP, can you monitor it effectively, and does your bank partner's policy permit it? (3) Based on the review, either update the approval memo to reflect the new scope (if acceptable), impose restrictions, or initiate exit. Doing nothing after observing drift is the worst outcome — it creates documented evidence that you knew and continued anyway.
How do you exit a higher-risk customer without creating legal or regulatory exposure?
Exit should follow the criteria your original approval memo established as exit triggers. Core protections: give reasonable notice per your customer agreement, do not cite constitutionally protected activity as the basis (the OCC and FDIC have warned against reputational-risk-based exits), document the specific compliance reason for the exit decision, and have the decision reviewed at the same authority level that approved the relationship. The goal is a documented, criteria-based exit — not an arbitrary debanking.
Rebecca Leung

Author

Rebecca Leung

Rebecca Leung has 8+ years of risk and compliance experience across first and second line roles at commercial banks, asset managers, and fintechs. Former management consultant advising financial institutions on risk strategy. Founder of RiskTemplates.

◆ Related framework

Compliance Essentials

Multi-domain compliance coverage: data privacy, incident response, BCP/DR, and SOC 2 — 43% off.

◆ Immaterial Findings · Weekly

Sharp risk & compliance insights practitioners actually read.

Enforcement actions, regulatory shifts, and practical frameworks — no fluff, no filler.

◆ Practitioners from banks, fintechs, and asset managers · Delivered weekly

Immaterial Findings · Newsletter

The brief, in your inbox.

Enforcement of the week, a framework breakdown, and the prompts that are actually worth running. Delivered to your inbox. Free.