About For Firms Methodology Insights Get started
Trading Integrity Bureau
Trading Integrity BureauIndependent Verification Body
Classification Public
Document TIB-FRM-CU-1.0
Issued 16 April 2026
Module of TIB-FRM-1.0
Type-Specific Module · Custodians

Verification Module — Custodians

Twenty-four binding criteria for verification engagements with traditional custodians, prime broker-dealer custody operations, and digital-asset custodians (qualified or otherwise).

Document code
TIB-FRM-CU-1.0
Universal base
TIB-IS-1.0
Adds
24 binding criteria · 8 themes
Effective
16 April 2026
Status
In force
Approved by
TIB Standards Committee
Issued by
Stratinova LTD
Aligned with
CPMI-IOSCO PFMI · ISO 27001 · NIST CSF
Distribution. Controlled public document. Reproduction with attribution.
© 2026 Stratinova LTD. All rights reserved.
Controlled ModuleApproved · In force
Foreword

About this module

This module (the CU Module) extends the universal TIB Integrity Standards with criteria specific to custodians — entities holding financial or digital assets on behalf of third parties. It applies to traditional custodians, prime broker-dealer custody operations, and digital-asset custodians (qualified or otherwise). The module is informed by CPMI-IOSCO Principles for Financial Market Infrastructures, ISO/IEC 27001, and NIST Cybersecurity Framework where structurally relevant.

The module adds twenty-four binding criteria (CU-1 through CU-24).

Module code
TIB-FRM-CU-1.0
Authority
TIB Standards Committee
Effective date
16 April 2026
Universal base
TIB-IS-1.0

Verification Module — Custodians

Twenty-four binding criteria with rationale, requirement, evidence rubric, illustrative cases, and cross-references.

Status
In force
Themes
8
Criteria
24

Scope

This Module applies whenever the engagement covers a Firm whose activities include the custody of financial or digital assets on behalf of third parties.

Joint application

Where the custodian also operates an exchange or trading venue, the Exchanges Module (TIB-FRM-EX) is invoked jointly. Where custody is incidental to brokerage, the Brokers Module (TIB-FRM-BR) covers the custody arrangements.

Out of scope

TIB does not opine on regulatory licensing in any jurisdiction. For digital-asset custodians, TIB review covers operational controls and disclosed architecture, not cryptographic implementation correctness.

Definitions

  • Asset Holder — the third party on whose behalf assets are held by the custodian.
  • Sub-custodian — an entity to which the principal custodian delegates custody of specific assets.
  • Tri-party — an arrangement involving the custodian, the asset holder, and one or more other regulated entities.
  • Omnibus — an aggregated account holding assets of multiple holders.
  • Cold Storage — (digital assets) keys stored offline, typically with hardware-security-module backing.
  • Hot Wallet — (digital assets) keys accessible to online systems for operational throughput.
  • MPC — multi-party computation; a cryptographic technique allowing key fragments held by multiple parties.
  • PoR — proof of reserves; an attestation regime for demonstrating custody backing.

Theme map

ThemeCriteriaUniversal pillarSection
Segregation depthCU-1, CU-2, CU-3TIB-IS.2 Capital§ 4
Tri-party arrangementsCU-4, CU-5TIB-IS.2 Capital / TIB-IS.6§ 5
Sub-custodian networkCU-6, CU-7, CU-8TIB-IS.2 / TIB-IS.5§ 6
Insolvency protectionsCU-9, CU-10TIB-IS.2 / TIB-IS.6§ 7
ReconciliationCU-11, CU-12, CU-13TIB-IS.5 Risk§ 8
Key management (digital assets)CU-14, CU-15, CU-16, CU-17TIB-IS.5 Risk§ 9
Withdrawal authorisationCU-18, CU-19, CU-20TIB-IS.5 Risk / TIB-IS.4§ 10
Insurance and proof of reservesCU-21, CU-22, CU-23, CU-24TIB-IS.6 Disclosure§ 11

Segregation depth

CU-1

Account-level segregation

Asset-holder positions must be recorded at the granularity disclosed; cross-pollution between holders is the worst-case custody failure.

Asset-holder positions are recorded at the level of granularity disclosed (omnibus, individually segregated, per-account). Cross-pollution between asset holders is prevented by documented controls.

PassAccount architecture documentation; segregation policy; sample reconciliations. CondArchitecture documented but controls thin; remediation. FailCross-pollution observed; or segregation level not as disclosed.
References TIB-IS.2.B PFMI Principle 14
CU-2

Asset registration

The legal form in which assets are registered determines whose claim attaches in insolvency.

Registered assets are recorded in the name appropriate to the segregation arrangement (custodian as nominee, asset-holder direct, trust structure) and aligned with disclosure to the asset holder.

PassRegistration records sample; legal opinion (where applicable); disclosure document consistent. CondRegistration consistent but disclosure ambiguous; remediation. FailDisclosure misrepresents legal form of holding.
References TIB-IS.2.B
CU-3

Asset-class scoping

Different asset classes (cash, securities, digital assets) may have materially different segregation regimes; clarity on which applies to what is essential.

Asset-class-specific segregation regimes are documented; mixed-asset accounts are explicitly addressed.

PassAsset-class scoping document; sample of mixed-asset accounts handled per scoping. CondScoping general; remediation. FailMaterial asset class outside documented segregation regime.
References TIB-IS.2.B

Tri-party arrangements

CU-4

Tri-party contracts

Tri-party arrangements multiply the entities with claims on assets; clear allocation of asset-control, instruction-authority, and dispute-resolution provisions is essential.

Tri-party agreements identify asset-control, instruction-authority, and dispute-resolution provisions clearly.

PassSample tri-party agreement (redacted) with all three elements clearly addressed. CondMost elements addressed but one ambiguous; remediation. FailMaterial ambiguity in tri-party allocation.
References TIB-IS.2.C
CU-5

Tri-party operational testing

Tri-party arrangements must be operationally tested, especially for dispute scenarios.

Tri-party arrangements are operationally tested at least annually; dispute-resolution scenarios are rehearsed.

PassTest schedule; recent test report. CondTests conducted but not documented; remediation. FailNo testing; or test failures unaddressed.
References TIB-IS.5.C

Sub-custodian network

CU-6

Sub-custodian selection diligence

Sub-custodian failure transmits to the principal custodian and ultimately to asset holders; selection diligence is foundational.

Sub-custodians selected under documented diligence covering credit, segregation, regulatory standing, and operational capability. Diligence refreshed at least annually.

PassSub-custodian register; diligence files; refresh dates. CondOnboarding diligence done; refresh inconsistent; remediation. FailNo diligence; or material adverse changes at sub-custodian unaddressed.
References TIB-IS.2.C PFMI Principle 19
CU-7

Sub-custodian disclosure

Asset holders should know which entities hold their assets; sub-custodian network changes that affect their position should be notified.

Sub-custodian network in use is disclosable to asset holders on request. Material changes (additions, removals, downgrades) are notified.

PassDisclosure document; change-notification log. CondDisclosure on request operates; notification informal; remediation. FailMaterial network changes undisclosed.
References TIB-IS.6.A
CU-8

Sub-custodian credit-risk monitoring

Sub-custodian credit conditions change; periodic monitoring after onboarding is essential.

Sub-custodian credit posture is monitored periodically; material changes trigger documented review.

PassCredit-monitoring methodology; trigger-event sample. CondMonitoring exists but not formal; remediation. FailNo monitoring; or material credit deterioration unaddressed.
References TIB-IS.5.A

Insolvency protections

CU-9

Insolvency-protection mechanism

Asset-holder protection on custodian insolvency is the primary substantive protection custody arrangements offer; the mechanism must be documented and tested in legal opinion.

The mechanism by which asset-holder claims are protected on insolvency of the custodian (statutory trust, ring-fenced funds, dedicated entity, regulator-overseen wind-down) is documented and disclosed.

PassLegal memo from qualified counsel; disclosure document; jurisdiction reference. CondMechanism documented but legal opinion absent; remediation. FailDisclosure overstates protection relative to actual legal form.
References TIB-IS.2.B
CU-10

Wind-down plan

For systemically important custodians, a documented wind-down plan reduces the cost of failure on the broader system and on asset holders.

For material custodians, a wind-down plan exists with priority-of-restoration, asset-holder communication, and regulator engagement protocols.

PassWind-down plan; periodic review evidence. CondPlan exists but not reviewed; remediation. FailNo wind-down plan for material custody.
References TIB-IS.5.A PFMI Principle 15

Reconciliation

CU-11

Internal-vs-external reconciliation

Daily reconciliation between internal records and external reality (sub-custodian, depositary, blockchain) is the primary control over asset existence.

Reconciliation between internal records and external (sub-custodian, depositary, blockchain) records is performed daily for liquid asset classes; cadence documented for less-liquid classes.

PassReconciliation procedure; sample of recent reconciliations; daily for liquid classes. CondDaily for some classes only; remediation. FailReconciliation less than daily for liquid classes; or material breaks unresolved.
References TIB-IS.2.D
CU-12

Break investigation SLA

Reconciliation breaks above defined thresholds must be investigated quickly to prevent accumulation.

Reconciliation breaks above defined thresholds are investigated within a documented SLA. Break register records issue, root cause, and resolution.

PassBreak register sample; SLA met in >95% of cases. CondSLA exists but breached frequently; remediation. FailMaterial breaks unresolved beyond SLA; or no escalation.
References TIB-IS.2.D
CU-13

Reconciliation independence

Reconciliation must be performed by personnel separated from those who authorise transactions; otherwise the control is reduced to attestation by the controlled party.

Reconciliation is performed by personnel separated from transaction authorisation; results are reviewed by an independent function.

PassReporting structure; sample reconciliation sign-off chain. CondSeparation operates informally; remediation. FailSame personnel authorise and reconcile transactions.
References TIB-IS.1.E TIB-IS.2.D

Key management (digital assets)

CU-14

Key generation and storage architecture

For digital-asset custody, key management is the security perimeter; HSM, MPC, and multi-signature architectures with documented design are baseline.

Key generation, storage architecture (HSM, MPC, multi-signature), and key-segregation arrangements are documented and reviewed by an independent function.

PassKey-management policy; architecture diagram; independent review (e.g. SOC 2 Type II or external security audit). CondArchitecture documented; independent review aged or absent; remediation. FailSingle-key custody; or no documented architecture.
References TIB-IS.5.F NIST SP 800-57 ISO/IEC 27001
CU-15

Hot / cold storage allocation

Hot-wallet exposure is operational risk; cold-storage majority is the structural defence.

Hot / cold storage allocation policy is documented; cold-storage majority is the default; deviations require documented rationale.

PassAllocation policy; observed ratios consistent. CondAllocation drifts toward hot; remediation. FailHot-wallet majority without rationale; or hot wallet sized to entire participant base.
References TIB-IS.5.F
CU-16

Key rotation and ceremony

Periodic key rotation reduces exposure to compromised keys; the ceremony is a high-risk operation requiring documented procedure.

Key rotation occurs periodically per documented schedule; ceremonies follow procedure with multi-party participation and external observation where appropriate.

PassRotation schedule; ceremony procedures; recent ceremony evidence. CondSchedule exists but ceremonies informal; remediation. FailNo rotation; or ceremonies single-person operations.
References TIB-IS.5.F
CU-17

Key recovery and disaster scenarios

Key loss is a permanent custody failure; recovery procedures, including multi-jurisdictional fragments, are essential.

Key-recovery procedures address loss scenarios; multi-jurisdictional fragments or analogous resilience exists; recovery is rehearsed periodically.

PassRecovery procedure; rehearsal evidence; resilience architecture. CondProcedure documented but not rehearsed; remediation. FailNo recovery; or single point of failure in key custody.
References TIB-IS.5.F

Withdrawal authorisation

CU-18

Multi-party authorisation

Withdrawals must require authorisation under documented controls; sole-key authorisation is structurally unacceptable for custody at scale.

Withdrawals require authorisation under documented controls (multi-party approval, withdrawal-address whitelisting, time-locks). Sole-key authorisation is prohibited.

PassWithdrawal procedure; control matrix; sample of recent withdrawals. CondMulti-party in design but workarounds exist; remediation. FailSole-key authorisation operates; or material withdrawals bypass controls.
References TIB-IS.5.F
CU-19

Withdrawal address controls

Withdrawal-address whitelisting and cooling-off periods reduce social-engineering and account-takeover risk.

Whitelisting and cooling-off mechanisms operate; new addresses require time-delayed activation and additional confirmation.

PassWhitelisting policy; cooling-off configuration; sample. CondWhitelisting operates but optional; remediation to make default. FailNo whitelisting; account-takeover risk unmitigated.
References TIB-IS.5.F
CU-20

Withdrawal monitoring and limits

Velocity limits and pattern monitoring detect abnormal withdrawal activity at the operational layer.

Withdrawal velocity limits and pattern monitoring operate; abnormal patterns trigger investigation per documented procedure.

PassLimits documented; monitoring sample; investigation procedure. CondLimits exist but no investigation procedure; remediation. FailNo limits or monitoring.
References TIB-IS.5.C

Insurance and proof of reserves

CU-21

Insurance disclosure

Insurance is a recoverability layer; its scope and exclusions must be transparent to asset holders.

Insurance arrangements covering custody (crime, cyber, errors and omissions) are summarised: insurer, coverage limit, exclusions, applicability to asset-holder claims. Where no insurance is maintained, the absence is disclosed.

PassInsurance schedule; disclosure document. CondInsurance exists but exclusions thinly disclosed; remediation. FailInsurance marketed but coverage materially less than implied; or no disclosure.
References TIB-IS.6.A
CU-22

Proof-of-reserves attestation methodology

Proof-of-reserves attestations have varying robustness; methodology disclosure prevents headline claims from masking weak attestation regimes.

Where the custodian publishes proof-of-reserves attestations, methodology, frequency, and limitations are disclosed.

PassAttestation methodology; trailing attestations; limitations disclosed. CondAttestations published but methodology thin; remediation. FailAttestations marketed but methodology obscured; or one-off attestation not refreshed.
References TIB-IS.6.A
CU-23

Liabilities-side disclosure

Reserves alone do not guarantee solvency; the liabilities side of the balance sheet must be evidenced for proof-of-solvency claims.

Where the custodian asserts proof-of-solvency or full reserve backing, the liabilities-side disclosure (typically via Merkle tree or audited liabilities) accompanies the reserves attestation.

PassLiabilities-side methodology; integration with reserves attestation. CondReserves attested; liabilities not; remediation if solvency claim made. Fail"100% reserves" claimed without liabilities-side evidence.
References TIB-IS.6.A
CU-24

Withdrawal performance disclosure

Withdrawal performance is the empirical proof of custody integrity from the asset-holder perspective.

Withdrawal performance (request-to-disbursement) is monitored and disclosable on request. Material delays are explained.

PassPerformance log; trailing 90-day distribution. CondLog maintained but not disclosable; remediation. FailWithdrawal halts unexplained; or no monitoring.
References TIB-IS.4.B

Public Report sections

  • Custody architecture summary — segregation level, sub-custodian count, jurisdictions;
  • Insolvency-protection mechanism as plain-language summary;
  • Asset-class coverage — which asset classes are within engagement scope;
  • Insurance and PoR posture — high-level summary.

Evidence pathway

EvidenceSourceFrequency
Sub-custodian registerOperations / treasuryCurrent state
Reconciliation logOperations30-day sample
Key-management policy and reviewSecurity / complianceMost recent independent review (e.g. SOC 2 Type II)
Withdrawal authorisation matrixOperationsCurrent state + sample of recent withdrawals
Insurance scheduleRisk / financeCurrent policy
Proof-of-reserves methodologyPublic attestation libraryTrailing attestations
Wind-down planTreasury / riskCurrent version + review evidence

Limitations

  • TIB does not opine on regulatory licensing of the custodian in any jurisdiction;
  • For digital-asset custodians, TIB review covers operational controls and disclosed architecture, not cryptographic implementation correctness;
  • Insurance coverage scope is summarised; asset holders should review the full policy for detailed exclusions.

Module changelog

VersionEffectiveApproved byNotes
TIB-FRM-CU-1.016 April 2026TIB Standards CommitteeInitial publication. 24 binding criteria across 8 themes.
Annex A — Normative
Criterion-to-Pillar Map

Normative annex.

Universal pillarModule criteria contributing
TIB-IS.1 GovernanceCU-13
TIB-IS.2 Capital & SafeguardingCU-1, CU-2, CU-3, CU-4, CU-6, CU-9, CU-11, CU-12
TIB-IS.3 Order Handling & Execution(N/A)
TIB-IS.4 Payout IntegrityCU-24
TIB-IS.5 Risk & ComplianceCU-5, CU-8, CU-10, CU-14, CU-15, CU-16, CU-17, CU-18, CU-19, CU-20
TIB-IS.6 Disclosure & ConductCU-7, CU-21, CU-22, CU-23
Annex B — Informative
Document Control

Informative annex.

Document codeTIB-FRM-CU-1.0
Issuing authorityTIB Standards Committee
Effective date16 April 2026

Issuing entity

Stratinova LTD

Cyprus HE475207

Parent & base

TIB-FRM-1.0 Framework

TIB-IS-1.0 Standards

Related modules

Exchanges

Brokers

Hedge Funds

TIB-FRM-CU-1.0 · Effective 2026-04-16 · Approved TIB Standards Committee · Public · Controlled Document · 24 criteria · 8 themes© 2026 Stratinova LTD