COREDO – EU Legal & Compliance Services Expert legal consulting, financial licensing (EMI, PSP, CASP under MiCA), and AML/CFT compliance across the European Union. Headquartered in Prague, we provide seamless regulatory solutions in Germany, Poland, Lithuania, and all 27 EU member states.
I regularly meet executives who are ready to scale work with digital assets, but are stuck on two things: the BaFin license and the architecture of secure key storage. Since 2016 the team COREDO has supported dozens of projects for company registration in the EU and Asia, obtaining financial licenses and building compliance functions. During this time I have gathered a set of proven approaches that really save time and reduce operational risks. In this text I will systematically go through the path from legal structure to key architecture and regulatory reporting – with a focus on Germany and BaFin, but taking into account MiCA and EU requirements.
Our experience at COREDO has shown: a strong custody service doesn’t start with HSM, but with a clear regulatory model, a comprehensible operational architecture and compliance discipline. Technology is an important layer here, but without the right license, contractual framework and AML/KYC procedures the business risks getting a stop signal at the start.
Regulatory framework of Germany and the EU

The regulatory framework of Germany and the EU increasingly shapes requirements for the handling and storage of crypto-assets, setting standards for licensing, supervision and investor protection. Below we will examine the key elements of oversight – including the role of BaFin and the specifics of regulating crypto custody.
BaFin regulation of crypto custody
MiCA: impact on BaFin custodians
AMLD5 and AMLD6: AML/KYC and GDPR
BaFin license for crypto custody

BaFin‑Licensing of crypto custody requires strict compliance with regulatory requirements and transparent documentation. Below we will examine in detail the stages and structure of obtaining the license, including the key legal, operational and technical criteria for successfully completing the process.
How to obtain a BaFin custody license
I recommend starting with the legal structure for custody in the EU (GmbH, AG). For crypto custody in Germany a GmbH is usually suitable, while mature players planning to raise capital choose an AG. Capital requirements for custody depend on the service profile; for pure storage of private keys the starting capital is usually from €125,000, and is higher when combined with payment services. The cost of obtaining a BaFin license consists of document preparation, technology implementations (HSM/MPC), hiring key personnel (MLRO, CISO, Head of Risk), certifications (ISO 27001, sometimes SOC 2 Type II), insurance and legal support.
Process stages:
- Pre-licensing gap analysis against BaFin/BAIT/MaRisk and MiCA.
- Designing the operational model: custody vs non-custodial, cold/hot storage, MPC or multisig, key ceremony protocol and key rotation policy.
- Building compliance: AML/KYC, sanctions screening, risk-based approach, incident management and notifications to the regulator.
- IT and security: HSM (Hardware Security Module) or MPC (Multi-Party Computation), cold key storage infrastructure, air-gapped signing, audit trail and logging.
- Documentation and submission: policies, regulations, client agreements, legal agreements for HSM outsourcing.
- On-site inspections and responses to inquiries.
Checklist for preparing for a BaFin inspection
- Governance: qualified executives, independent risk and compliance, information security committee.
- Policies and procedures: private key storage requirements, access management and role models in custody, key ceremony and backup, disaster recovery plan and business continuity plan.
- IT governance under BAIT: asset inventory, vulnerability management, change management, incident response.
- Security: BaFin HSM security requirements, description of MPC/threshold signatures, multisignature and key storage, cold wallet architecture and hot wallet risk.
- Quality control: penetration testing and red team, bug bounty programs, security audit for crypto custody, SOC 2 Type II audit if available, ISO 27001 certification.
- Finance: capital requirements, OPEX vs CAPEX model, ROI calculation for security investments and overall financial plan.
- Contract framework: preparation of custody agreements for corporate clients, SLA 99.9% availability, key storage regulations and GDPR, fiduciary duty for custodians, segregation of client assets, trustee model custody.
- Reporting: BaFin regulatory reports, security metrics for BaFin reporting, incident notification policies.
Supervision and incident reporting
Key storage architecture

Building the technological architecture for key storage defines a set of decisions responsible for the security, availability and manageability of cryptographic materials. In the following subsections we consider the role of HSMs and outsourcing options for critical components to show how different approaches affect risks and operational requirements.
Outsourcing critical components and HSM
MPC, multisig and secret sharing
Fault tolerance, scaling and audit
Designing a fault-tolerant key architecture includes distributed key storage for scaling, geo-replication, independent quorum channels and deterministic run-books for incidents. A multi-tenant custody platform requires strict segmentation, circuit isolation and continuous monitoring. Audit trail and logging must cover administrative actions, transactions, access to secrets and configuration changes.
Custodial staking: risks
Assets, integrations and SLA
Risk management and compliance

Effective risk management and strict compliance require a systemic approach to identifying and mitigating financial threats. In this context, AML/KYC and regular transaction monitoring become key tools to prevent fraud and money laundering.
AML/KYC: transaction monitoring
Resilience and security
Insurance and fiduciary duties
Insurance of crypto custody assets: a separate track. Custody insurance policy and underwriting of crypto risks take into account limits for hot and cold wallets, exclusions and deductibles. How to choose an insurance product for a custodian? I assess the insurer’s financial stability, cyber-risk coverage, limits on social engineering and control requirements.
Data privacy and regulations
Strategy and economics of launching a service

The project’s economics and the chosen strategy shape the decision-making framework during preparation and launch of the service, setting priorities for resources and the acceptable level of risk. Below we will examine in detail the cost model, required capital and key ROI metrics to build a justified go-to-market plan.
Cost model and ROI
OPEX vs CAPEX модель помогает прозрачнее коммуницировать с советом директоров. CAPEX, HSM, сети, лицензии на ПО, сертификации; OPEX – штат комплаенса и ИБ, страховки, аудит, колокации, bug bounty. Стоимость получения лицензии BaFin и последующее содержание зависят от масштаба.
In-house vs third-party and white-label
The comparison of in-house vs third-party custody boils down to control, speed of launch, and the regulatory curve. White-label custody solutions allow faster market entry but increase dependence and requirements for third-party risk management. Migration of crypto-assets between custody providers — a scenario I plan for at the start — includes procedures for key rotation, attestation of balances and client notifications.
Outsourcing HSM legal agreements require clear SLAs, audit rights, requirements for data geography and recovery plans. Third-party risk management includes periodic assessments, stress tests and forensic clauses in contracts.
Operational resilience and SLA
COREDO case studies: licensing and integration
In a series of COREDO case studies we show practical steps – from obtaining a license to real bank integration scenarios. Using the example of Germany, we examine BaFin’s requirements, key architecture and technical solutions necessary to comply with regulatory and banking requirements.
BaFin: license and key architecture
The COREDO team recently implemented a project for a fintech planning custody for large corporate clients. We chose a GmbH, prepared the BaFin submission package, deployed HSMs for master keys and MPC for operational signing. The client obtained ISO 27001 certification, underwent a SOC 2 Type II audit and set up proof-of-reserves methodologies with regular attestation reports. The contractual framework established segregation of client assets and a trustee-model custody, as well as terms for custodial staking and disclosure of slashing risk.
EU passporting after launch
Another client launched custody in Germany with an eye on the EU. We built a model compatible with MiCA and prepared EU passporting for custody services. The legal structure and policies immediately accounted for Cyprus and Estonia’s requirements for IT resilience and staffing, which accelerated regional expansion.
Integration into a banking group
A separate case — implementing custody in a banking group with presence in the UK, Singapore and Dubai. We integrated custody into the bank’s structure via API, REST/WebSocket, supporting corporate accounts and sub-accounts. For the CTO/CISO we set up key KPIs, reports for risk committees and regular red team exercises.
Practical tools
To minimize risks when choosing a custody provider, rely on practical methods and tools that turn abstract requirements into concrete checks. Below is a compact checklist for reviewing custody providers with key criteria for security, compliance and operational reliability.
Checklist for reviewing custody providers
Reviewing custody providers: a checklist for the director
- Licenses and supervision: BaFin license for crypto custody, MiCA plans, regulatory history, inspection precedents.
- Security: HSM/MPC, key ceremony protocol, air-gapped signing, penetration testing, bug bounty, ISO 27001/SOC 2.
- Operations: SLA 99.9%, incident response, disaster recovery, business continuity, audit trail.
- Compliance: AML/KYC, sanctions screening, AML transaction monitoring, GDPR.
- Legal: segregation of client assets, trustee model custody, insurance, outsourcing, HSM legal agreements.
- Technology: support for Bitcoin/Ethereum, ERC-20/ERC-721, layer-2 and custody, cross-chain custody, API REST/WebSocket.
- Economics: fees, limits, OPEX vs CAPEX, ROI assessment.
- Migration: export of keys/addresses, proof of reserves during transition, timelines and risks.
What to include in contracts and SLAs
Preparing custody agreements for corporate clients should specify:
- Scope of services, supported assets, custodial staking requirements.
- Segregation of assets, fiduciary duty, insurance and limits.
- Incident management and regulator notifications, RTO/RPO, maintenance windows.
- Key policies: private key storage requirements, key rotation, access controls.
- Proof of reserves and attestation reports, audit rights.
- Management of custody operational risks and third-party risk management.
Recovery after key compromise
A key recovery plan after compromise should include:
- Identification of the affected area and containment scenario.
- Generation of new keys (key ceremony), transfer of assets, policy updates.
- Communications: clients, regulator, counterparties.
- Forensics package: collection of artifacts, preservation of logs, independent analysis.
- Post-incident plan: lessons learned, control updates, retesting and attestations.
Frequently Asked Questions and Short Answers
Conclusions
COREDO doesn’t offer magical shortcuts. But we do have the tools, practices and experience that make this path manageable: from choosing between HSM and MPC to BaFin regulatory reports and proof of reserves. If you are planning a custody case in Germany, Czechia, Slovakia, Cyprus, Estonia, the United Kingdom, Singapore or Dubai – let’s break it down into clear modules, calculate ROI and build an architecture that will withstand both regulatory audits and the requirements of your corporate clients. COREDO’s experience shows: a systematic approach pays off faster than promises to ‘do everything in three weeks’.