Since 2016 the COREDO team has implemented dozens of projects for registering companies in the EU, Asia and CIS countries, obtaining financial licenses, setting up AML and launching operational processes for fintech. In this article I have compiled the experience that helps clients move from the idea of a payment service to an international scalable model with passporting, a transparent compliance function and a sustainable economic model.
PI or EMI: license or partnership

The first fork: EMI license vs PI license. Licensing of an EMI and a payment institution differs in essence: an EMI may issue electronic money and hold customer balances in wallets, while a PI provides payment services without issuing e-money. These are different business risks, capital requirements and safeguarding procedures for customer funds in the EU, so the choice should be driven by the product roadmap.
The second fork — license vs partnership with a bank. A partnership model (sponsored BIN, white-label, agency agreements) speeds up an MVP launch and reduces CAPEX, but adds dependence on another party’s compliance policy and limits international scalability. Registering your own payment institution in the EU requires time and resources, but provides control, pricing flexibility and direct access to schemes and correspondent banks. Our team often builds a hybrid: a quick start through a bank partner, followed by opening a payment institution in the EU for key markets.
The legal structure is also important. Legal models — branch vs subsidiary — for entering the EU market offer different levels of substance and risk manageability. A subsidiary simplifies passporting and interaction with regulators, whereas a branch is suitable for testing hypotheses or limited presence. For non‑EU groups you need to consider passporting limitations and the lack of full equivalence: often the right move is to create EU substance with independent management and local compliance.
EU regulators: PSD2, EBA and discretions

PSD2 regulation of payments in the EU and the EBA’s guidance on payment services have formed the basic layer of requirements. But within this framework national PSD2 discretionary rules and differences in EU regulators’ requirements for payment institutions apply. Our experience at COREDO has shown that properly aligning national approaches saves months and reduces the amount of correspondence in the licensing process.
- regulatory requirements of BaFin for payment institutions place greater emphasis on IT security and outsourcing (MaRisk, BAIT), thorough management checks and clear segregation of duties. This is a market with intensive supervision and a high quality of dialogue, but expectations regarding substance and operational maturity are above average.
- ACPR’s regulatory requirements for payment institutions focus on consumer protection, safeguarding and incident management. In an application, clarity of governance, third‑party contracts and a measurable staff training programme are valued.
- DNB’s regulatory requirements for payment institutions have traditionally been strong on integrity risk and the management of outsourcing chains. In the Netherlands they pay close attention to control models, the independence of the compliance function and the realism of financial plans.
- Banco de España’s regulatory requirements for payment institutions add an emphasis on local presence and reporting. The regulator expects a well‑thought‑out implementation of transaction monitoring requirements and scenario‑based risk analysis.
- The Central Bank of Ireland’s (CBI) regulatory requirements are known for the strict “fitness and probity” threshold, the structure of PCF roles and the requirement for detailed operational resilience plans. It is one of the most consistent review practices in the EU.
- CSSF and Banca d’Italia demonstrate high expectations for capital, IT controls and AML. In Italy it is important to carefully describe ring‑fencing and liquidity buffers, whereas in Luxembourg — to demonstrate the maturity of risk management when outsourcing actively.
The ECB’s roles and supervision in payment infrastructure concern the oversight of clearing/settlement systems and systemically important operators. For PI/EMI the main contact is the national regulator, but ECB standards form the backdrop of expectations regarding resilience and incident reporting. Ongoing supervision versus preferential procedures across EU countries vary in inspection intensity, but the general trend is greater focus on operational risks and cyber resilience.
Capital, safeguarding and liquidity

Capital requirements for payment institutions in the EU depend on the range of services and are calculated under PSD2 methodologies (Methods A/B/C), and the minimum initial capital for PI is usually in the range of €20–125 thousand. For EMI it is higher, typically from €350 thousand, taking into account electronic money issuance and the specific risks of holding balances. Capital requirements: minimum amounts and buffers are combined with capital reserve requirements and capital adequacy based on stress‑tests and growth plans.
Safeguarding via segregated accounts vs trust accounts: a key choice of operational model. In some jurisdictions insurance/guarantee alternatives apply, but segregation of funds in accounts at credit institutions predominates. Differences in reserve and ring‑fencing requirements appear in the details: the timeframe for daily segregation, permissible custodian banks, reconciliation mechanics and independent audit checks.
AML/KYC: policy and metrics

AML requirements for payment institutions are built on the AML Directives (AMLD5, AMLD6) and the recommendations of FATF. They require assessing risks, applying KYC/KYB, beneficial owner (BO) verification procedures for PI, monitoring transactions and establishing reporting on suspicious operations. The solution developed at COREDO often includes risk matrices by jurisdictions, products and channels, as well as the design of an escalation “ladder” and exception handling.
SCA/RTS, GDPR and resilience

Outsourcing and fraud prevention
Outsourcing and third-party management in payment institutions are an area of increased inspection scrutiny. Management of business partners and Due Diligence of vendors should include assessment of financial stability, security controls and the compliance of their subcontractors. Requirements for third-party risk management and SLAs imply metrics for availability, response times, quality of investigations and a documented escalation procedure.
Regulatory frameworks affect both permitted and prohibited business models for payment institutions, including restrictions on holding funds outside safeguarding and mixing client and own funds. Regulatory restrictions on FX and cross-border payments vary by country, especially regarding correspondent chains and exotic currencies. Regulation of interbank settlements and clearing (SEPA) sets standards for formats and timelines, and connection to schemes requires mature processes and a reliable IT architecture.
Documents, timelines, and the economics of compliance
The documents and the package for applying for a payment institution license include a business plan, financial models, policies and procedures, a description of the IT architecture, outsourcing agreements, safeguarding mechanics, a BCP/DR plan, compliance matrices, and management questionnaires. The COREDO team carefully synchronizes the operational and legal parts so that no “gaps” arise between the business and compliance vocabularies in correspondence with the regulator. This reduces the number of request rounds and speeds up the process.
Scalability, M&A and reputation
Requirements for internal control and the compliance function should be strengthened as growth occurs: independence, direct access to the board of directors, regular reports and improvement plans. Requirements for audit and external reporting and regulatory reviews and inspections: preparation and response are organized through a pre-approved “playbook” and a set of KPIs/evidence. Managing reputational risks in case of non-compliance includes transparent communication, a corrective action plan and documenting progress.
MiCA and tokenized assets
Crypto payments regulation and the intersection with MiCA is becoming a new reality for payment companies that want to accept or convert digital assets. Rules for e-money and the issuance of tokenized assets differ, and custodial vs non-custodial models in payments carry different risks and expectations regarding controls. At COREDO we help separate the flows: payment services under PSD2, e-money under EMI, and crypto services under national and pan-European MiCA regimes, so as not to “mix” risks and licences.
COREDO case studies – from application to growth
Another example – a fintech company’s entry into the German market targeting open banking services. We mapped BaFin’s IT and outsourcing requirements against the existing cloud architecture, strengthened change control and implemented an independent pen‑testing process. At the same time an approach to safeguarding via segregated accounts at a tier‑one bank was agreed and transaction monitoring scenarios were configured, which reduced operational risks and sped up integration with partners.
Payment institution launch checklist
- Licensing strategy and geography. Determine where local substance is critical and how quickly passporting is required, and build a PI vs EMI and bank‑partnership vs own‑license model over a 24‑month horizon. This approach reduces regulatory duplication and unnecessary costs of rebuilding the architecture.
- financial resilience and safeguarding. Calculate capital and buffers, choose a segregated vs trust account model, prepare agreements with custodian banks and descriptions of reconciliations. Ensure that ALM metrics and stress scenarios are available “at the push of a button”.
- Compliance and AML. Set up KYC/KYB, BO checks, OFAC/EU sanctions screening, PEP procedures and transaction monitoring with ML scenarios. Implement SAR/detection metrics and a false‑positives reduction program with feedback from investigations.
- Technology and security. Implement SCA/RTS, an API policy for open banking TPPs, GDPR controls and a data processing register. Conduct an independent pen test and document BCP/DR plans under DORA with incident reporting procedures.
- Outsourcing and third parties. Conduct supplier due diligence, agree SLAs, audit rights, exit plans and control subcontractors. Verify that the cloud architecture complies with local regulator requirements.
- Reporting and inspections. Prepare a regulatory calendar, report templates, a playbook for inspections and a change‑notification process for business‑model changes. Regularly train staff and maintain a culture of compliance.
COREDO’s scalable regulatory growth
Registrations, licences and AML are not “paperwork”, but a risk-management system that underpins the international payments business. When the foundation is strong – capital requirements are met, safeguarding is transparent, SCA/RTS are implemented, the AML framework is measurable and technological, growth happens faster, and the dialogue with regulators becomes constructive. At COREDO I insist on sequence: first strategy and architecture, then documentation and evidence, and only then the submission.
If your plan is to enter the EU and use passporting while keeping processes transparent and saving time, start with a well-considered roadmap. COREDO’s practice confirms: a strategy backed by measurable controls and attention to detail turns regulatory requirements into the foundation of long-term partnership with the market and regulators.